a0d6e54a3ad52dc2456093370c210044f2ad51d8c042ae3c101187e629208ba777f45db1226fe7021d8f94f6d19d3e00c889bb5a90735e1c782e74eb88e2479eb6b338f2714d773e0202cabd7a38c47332bc89828acf8051f2b67c64b0c42842eb933035bea8d"}, {0x28, 0x0, 0x45, "1be74eb550690c80f699dca4547fae29215a30395e"}, {0xf90, 0x1, 0x1, "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"}], 0x10f8}}], 0x2, 0x804) write$binfmt_aout(r1, &(0x7f0000006700)=ANY=[@ANYBLOB="08010000c8110000000000400000200000000000000000000100000000000000e606ec0000000000000000000000000000de50347558dc6216000cc2c777456fbf7d68854fd4e00cc984dff1077f0ae15ffa914ad1ceb396d4fe2553f706e09939fcd474649a080350db795b8284e7d63df78664ca0044a47ed24e3c00b8e93d89c1548a23687d35b41db8bea0ae04c67f"], 0xfdef) sendto$isdn(r1, &(0x7f0000000240)={0x71f, 0x0, "f40005b2b82a830b6dd698639605af82d1999f342fa78cd7aa57629f6cd2ca701fff6294d3f87e491fa13cd80415cb4bb7608d77a4bc5f9692e8"}, 0x42, 0x4c040, &(0x7f0000000040)={0x22, 0x2b, 0x3, 0x2, 0x2}, 0x6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000900)=ANY=[]}, 0x78) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000380)='NLBL_MGMT\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000066c0)={0x0, 0x0, 0x18}, 0x10) dup2(r0, r2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000140)={0x1, 0x1, 0x1000, 0x4, &(0x7f0000000000)="62cca1ec", 0x58, 0x0, &(0x7f00000000c0)="73c16c228a242c4933f41214caef8522648dfe50bf615e050d8f0302115847f3df68fdeb94e3462a3b3411e6ed276374fdc57afd7798e180906a9abbd0829b90ad43abfdbb8d0737487bd5a72d815dce0d7e100395d98e8b"}) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76006e) 17:57:16 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40046f41, 0x76006e) syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000006700)=ANY=[@ANYBLOB="08010000c8110000000000400000200000000000000000000100000000000000e606ec0000000000000000000000000000de50347558dc6216000cc2c777456fbf7d68854fd4e00cc984dff1077f0ae15ffa914ad1ceb396d4fe2553f706e09939fcd474649a080350db795b8284e7d63df78664ca0044a47ed24e3c00b8e93d89c1548a23687d35b41db8bea0ae04c67f"], 0xfdef) sendto$isdn(0xffffffffffffffff, &(0x7f0000000240)={0x71f, 0x4, "f40005b2b82a830b6dd698639605af82d1999f342fa78cd7aa57629f6cd2ca701fff6294d3f87e491fa13cd80415cb4bb7608d77a4bc5f9692e885644244b324686d8f3eb1228f7781ef6ca67a8460284ef42344747c058aed03464f308ce13083b998ee1519aa6ac7cc2aabd8d17cf73160402aa92f0bfbeb8d1011622c44"}, 0x87, 0x4c040, &(0x7f0000000040)={0x22, 0x2b, 0x3, 0x2}, 0x6) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000900)=ANY=[]}, 0x78) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000380)='NLBL_MGMT\x00') r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000066c0)={&(0x7f0000006680)='./file0\x00', 0x0, 0x18}, 0x10) dup2(r0, r1) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000140)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x57, 0x0, &(0x7f00000000c0)="73c16c228a242c4933f41214caef8522648dfe50bf615e050d8f0302115847f3df68fdeb94e3462a3b3411e6ed276374fdc57afd7798e180906a9abbd0829b90ad43abfdbb8d0737487bd5a72d815dce0d7e100395d98e"}) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) [ 1486.281430][T16031] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1486.317936][T16031] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1486.370854][T16031] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1486.431792][T16031] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1486.472710][T16031] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1486.482911][T16166] IPVS: ftp: loaded support on port[0] = 21 [ 1486.503648][T16165] ubi0: detaching mtd0 [ 1486.505568][T16031] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:57:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1486.535285][T16031] XFS (loop1): SB validate failed with error -117. [ 1486.545886][T16165] ubi0: mtd0 is detached 17:57:17 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xf000000000000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1486.688812][T16169] ubi0: attaching mtd0 [ 1486.724001][T16169] ubi0: scanning is finished 17:57:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010004600000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1486.845780][T16169] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 1486.853440][T16169] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 1486.873200][T16169] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 1486.880977][T16169] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 1486.903519][T16169] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 1486.965421][T16169] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 1486.987223][ T2573] tipc: TX() has been purged, node left! [ 1486.994869][ T2573] tipc: TX() has been purged, node left! [ 1486.997252][T16169] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3261519222 [ 1487.052015][T16169] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 1487.066185][T16177] ubi0: background thread "ubi_bgt0d" started, PID 16177 [ 1487.067958][T16165] ubi: mtd0 is already attached to ubi0 17:57:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1487.156177][ T9286] XFS (loop1): SB sanity check failed [ 1487.161892][ T9286] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1487.251266][ T9286] XFS (loop1): Unmount and run xfs_repair [ 1487.301285][ T9286] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1487.309060][ T9286] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1487.309089][ T9286] 00000010: 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 F............... [ 1487.309116][ T9286] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1487.309156][ T9286] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1487.309187][ T9286] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1487.309238][ T9286] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1487.309305][ T9286] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:57:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1487.309362][ T9286] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1487.311502][T16184] XFS (loop1): SB validate failed with error -117. 17:57:18 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)=0x100) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) semget$private(0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:57:18 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) socket$inet(0x2, 0x4000000000000001, 0x0) connect$can_bcm(r0, &(0x7f0000000140), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) io_submit(r1, 0x2000000000000072, &(0x7f0000000080)) 17:57:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010007400000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1488.033514][ T2903] XFS (loop1): SB sanity check failed [ 1488.039244][ T2903] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1488.072783][ T2903] XFS (loop1): Unmount and run xfs_repair [ 1488.088757][ T2903] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1488.115388][ T2903] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1488.135624][ T2903] 00000010: 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 t............... [ 1488.145278][ T2903] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1488.155620][ T2903] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1488.165136][ T2903] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1488.177304][ T2903] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1488.186662][ T2903] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1488.196069][ T2903] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1488.205626][T16225] XFS (loop1): SB validate failed with error -117. 17:57:18 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r3, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}}, 0x18}}, 0x0) 17:57:18 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xf4ffffff00000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:18 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x10) 17:57:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010007e00000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x1}, 0xc) 17:57:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1488.908848][ T2903] XFS (loop1): SB sanity check failed [ 1488.914836][ T2903] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1488.947631][ T2903] XFS (loop1): Unmount and run xfs_repair [ 1488.968591][ T2903] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1488.995828][ T2903] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:57:19 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e5"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) listen(0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) [ 1489.015824][ T2903] 00000010: 7e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ~............... [ 1489.025881][ T2903] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1489.035533][ T2903] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1489.044994][ T2903] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1489.055313][ T2903] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1489.064840][ T2903] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1489.074165][ T2903] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1489.083916][T16455] XFS (loop1): SB validate failed with error -117. 17:57:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1490.455624][ T2573] tipc: TX() has been purged, node left! 17:57:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000000140)=""/163, 0x100000345, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) 17:57:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003a800000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:22 executing program 2: r0 = socket(0x1f, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 17:57:22 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xf5ffffff00000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r3, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}}, 0x18}}, 0x0) [ 1491.931278][T16694] IPVS: ftp: loaded support on port[0] = 21 [ 1492.043084][ T7181] XFS (loop1): SB sanity check failed [ 1492.051083][ T7181] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1492.075424][ T7181] XFS (loop1): Unmount and run xfs_repair 17:57:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x84800, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) [ 1492.093482][ T7181] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1492.111379][ T7181] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1492.144420][ T7181] 00000010: a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1492.171117][ T7181] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1492.193959][ T7181] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1492.219636][ T7181] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1492.249021][ T7181] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1492.279595][ T7181] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1492.302321][ T7181] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1492.318120][T16696] XFS (loop1): SB validate failed with error -117. 17:57:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:23 executing program 2: [ 1492.503761][ T2903] XFS (loop1): SB sanity check failed [ 1492.509832][ T2903] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1492.547985][ T2903] XFS (loop1): Unmount and run xfs_repair [ 1492.584089][ T2903] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1492.605746][ T2903] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1492.615132][ T2903] 00000010: a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1492.624986][ T2903] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1492.634508][ T2903] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1492.644473][ T2903] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1492.654102][ T2903] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1492.663896][ T2903] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1492.673845][ T2903] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1492.685544][T16696] XFS (loop1): SB validate failed with error -117. 17:57:23 executing program 2: 17:57:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000b000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1493.068235][ T2573] tipc: TX() has been purged, node left! 17:57:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000000140)=""/163, 0x100000345, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) 17:57:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xfbffffff00000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:23 executing program 2: 17:57:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1493.124581][ T2903] XFS (loop1): SB sanity check failed [ 1493.130234][ T2903] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1493.165521][ T2903] XFS (loop1): Unmount and run xfs_repair [ 1493.171313][ T2903] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1493.195536][ T2903] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1493.204492][ T2903] 00000010: b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1493.225599][ T2903] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1493.234523][ T2903] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1493.265577][ T2903] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... 17:57:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r3, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}}, 0x18}}, 0x0) [ 1493.274514][ T2903] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1493.289498][ T2903] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1493.298564][ T2903] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1493.308430][T16919] XFS (loop1): SB validate failed with error -117. 17:57:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000000140)=""/163, 0x100000345, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) [ 1493.476278][T16968] IPVS: ftp: loaded support on port[0] = 21 17:57:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000c000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:24 executing program 2: 17:57:24 executing program 2: [ 1494.061624][T17085] XFS (loop1): SB sanity check failed [ 1494.087594][T17085] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:57:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1494.121433][T17085] XFS (loop1): Unmount and run xfs_repair [ 1494.141773][T17085] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:57:24 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xfe0b000000000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1494.179858][T17085] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1494.223314][T17085] 00000010: c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1494.289161][T17085] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:57:24 executing program 0: 17:57:24 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = memfd_create(&(0x7f0000000280)='\xef\xe7\r\x9e\xf8\x1fQ\xc1p\xf4\xdd\x1c)\xe37\x12\x10\x8eE\xedL76\x7f=S\xf3\xc7qS\x17\xcbN\"\xbc\xabOv\xcf\xa8A\x91\t\x00\x00\x00\x00\x00\x00\x00\xa4|3x\rR\xdfM\xda\xd0p\xbb\xe2]\xf1\x13\x87\x86\xb2\xafA\xc4\xf33X\x14\x9f>R\xff\xef&\x9f\xc7\xd8\xd3\xa0i\xc2`S\x93ik|\x99\xb0\xca\xf9RY\x91\x1d\xfc\xc8l\x87Q\xd7\xbf\xc4\xda,M\x14U4\xccqZ\xb2U \v\x81r\xf4\x0f<\xd9\x91;5\xba\x83\xb3\'\x18t\xb0\"\xc94\xd9\xa9$<2X1\x18$\xff\xd2\xa6\x16\"L\xd4\x91b3\x90\x9b2\xf0\xbdu\xa3,\xc97\xd1\xdd\x9b\xcdd\xc97\xcc\xc7\t\xd0\xde\xde\xc1\x98\x10\xc3\xe6\x87\x050\xf4>9\x13\"Yq\b\'\xb6\x84\xc0Q\x93\xbf\x06Ez\x18\xfb\x18s\x98\x81\xc4\x8f\xac\ry\x1f?\xe6\xefV\x9a\xf7\xa0\x84\x93\x1bW=\n\xd1EH\xae$l\xe7\xce\xec\xa0%\x12\x9e\xde\xa3\x11CsH\x9d\xa0QKc\x9a3\xb2\xd8|fc\xe3\x96\x82\xb7]wt\x05q\x1c<\xc0\xb5O\xbb#\xbc\x90`\xc7W|S', 0x2) fcntl$addseals(r2, 0x409, 0x15) splice(r0, 0x0, r2, 0x0, 0x420000a77, 0x0) [ 1494.373126][T17085] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1494.435709][T17085] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1494.485855][T17085] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:57:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(0x0) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1494.561232][T17085] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1494.642133][T17085] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1494.704749][T17085] XFS (loop1): SB validate failed with error -117. 17:57:25 executing program 2: 17:57:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000c400000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:25 executing program 0: 17:57:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(0x0) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:25 executing program 2: 17:57:25 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xfeffffff00000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:26 executing program 2: 17:57:26 executing program 0: [ 1495.568500][ T2903] XFS (loop1): SB sanity check failed [ 1495.574159][ T2903] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1495.623256][ T2903] XFS (loop1): Unmount and run xfs_repair [ 1495.642581][T17250] IPVS: ftp: loaded support on port[0] = 21 [ 1495.649351][ T2903] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1495.669315][ T2903] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1495.692003][ T2903] 00000010: c4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1495.713228][ T2903] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1495.733919][ T2903] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1495.754503][ T2903] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1495.777383][ T2903] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1495.799768][ T2903] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1495.822157][ T2903] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1495.843123][T17232] XFS (loop1): SB validate failed with error -117. 17:57:26 executing program 2: 17:57:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(0x0) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:26 executing program 0: 17:57:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003c800000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1496.447080][T17267] XFS (loop1): SB sanity check failed [ 1496.458568][T17267] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1496.485544][T17267] XFS (loop1): Unmount and run xfs_repair [ 1496.491685][T17267] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1496.547822][T17267] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1496.582338][T17267] 00000010: c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1496.591793][T17267] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1496.600935][T17267] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1496.611339][T17267] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1496.620980][T17267] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1496.645745][T17267] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1496.654702][T17267] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1496.717888][T17267] XFS (loop1): SB validate failed with error -117. [ 1496.886556][ T9286] XFS (loop1): SB sanity check failed [ 1496.892227][ T9286] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1496.918941][ T9286] XFS (loop1): Unmount and run xfs_repair [ 1496.924937][ T9286] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1496.933030][ T9286] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1496.942516][ T9286] 00000010: c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1496.951936][ T9286] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1496.961429][ T9286] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1496.970993][ T9286] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... 17:57:27 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:27 executing program 2: 17:57:27 executing program 0: 17:57:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(0x0, &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:27 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xff05000000000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1496.980484][ T9286] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1496.989958][ T9286] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1496.999373][ T9286] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1497.009019][T17267] XFS (loop1): SB validate failed with error -117. 17:57:27 executing program 0: [ 1497.135981][ T2573] tipc: TX() has been purged, node left! [ 1497.143878][ T2573] tipc: TX() has been purged, node left! 17:57:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003dc00000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:27 executing program 2: [ 1497.310683][T17308] IPVS: ftp: loaded support on port[0] = 21 17:57:27 executing program 0: [ 1497.549683][T17311] XFS (loop1): SB sanity check failed [ 1497.555221][T17311] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:57:28 executing program 0: 17:57:28 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(0x0, &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:28 executing program 2: [ 1497.625834][T17311] XFS (loop1): Unmount and run xfs_repair [ 1497.635895][T17311] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1497.649738][T17311] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1497.685970][T17311] 00000010: dc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1497.725578][T17311] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1497.773457][T17311] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1497.877953][T17311] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1497.925388][T17311] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1497.989302][T17311] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1498.031551][T17311] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1498.066668][T17311] XFS (loop1): SB validate failed with error -117. 17:57:29 executing program 0: 17:57:29 executing program 2: 17:57:29 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(0x0, &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:29 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xff0f000000000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:29 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003e600000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:29 executing program 0: [ 1498.933418][T17357] IPVS: ftp: loaded support on port[0] = 21 17:57:29 executing program 2: [ 1499.100378][T17358] XFS (loop1): SB sanity check failed [ 1499.106383][T17358] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1499.118731][T17358] XFS (loop1): Unmount and run xfs_repair [ 1499.125675][T17358] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1499.133878][T17358] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1499.143410][T17358] 00000010: e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1499.152974][T17358] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1499.162499][T17358] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1499.173658][T17358] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1499.186031][T17358] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:57:29 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), 0x0, &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1499.195878][T17358] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1499.208349][T17358] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1499.226940][T17358] XFS (loop1): SB validate failed with error -117. 17:57:29 executing program 0: 17:57:29 executing program 2: 17:57:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003ec00000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:30 executing program 0: [ 1499.680153][ T2573] tipc: TX() has been purged, node left! 17:57:30 executing program 2: 17:57:30 executing program 0: 17:57:30 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xffefffff00000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1500.014694][T17394] XFS (loop1): SB sanity check failed [ 1500.030263][T17394] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1500.047837][T17394] XFS (loop1): Unmount and run xfs_repair [ 1500.078892][T17394] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1500.128871][T17394] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1500.188515][T17394] 00000010: ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1500.219945][T17394] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1500.274374][T17394] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1500.374841][T17394] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1500.384286][T17394] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1500.393629][T17394] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1500.414925][T17394] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1500.432512][T17394] XFS (loop1): SB validate failed with error -117. 17:57:31 executing program 4: unshare(0x40000000) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), 0x0, &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:31 executing program 2: 17:57:31 executing program 0: 17:57:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010c0ed00000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:31 executing program 2: [ 1500.893796][T17427] IPVS: ftp: loaded support on port[0] = 21 17:57:31 executing program 0: 17:57:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), 0x0, &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1501.148436][ T9286] XFS (loop1): SB sanity check failed [ 1501.153979][ T9286] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1501.273653][ T9286] XFS (loop1): Unmount and run xfs_repair [ 1501.295712][ T9286] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1501.306814][ T9286] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 c0 XFSB............ [ 1501.326278][ T9286] 00000010: ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1501.346947][ T9286] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:57:31 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xffffffff00000000, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:31 executing program 2: 17:57:31 executing program 4: unshare(0x40000000) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1501.369336][ T9286] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1501.378551][ T9286] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1501.387771][ T9286] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1501.397194][ T9286] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1501.407025][ T9286] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1501.416886][T17435] XFS (loop1): SB validate failed with error -117. 17:57:32 executing program 0: 17:57:32 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:32 executing program 2: [ 1501.777791][T17471] IPVS: ftp: loaded support on port[0] = 21 17:57:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003ee00000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:32 executing program 0: 17:57:32 executing program 2: [ 1502.249579][T17346] XFS (loop1): SB sanity check failed [ 1502.255098][T17346] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1502.289833][T17346] XFS (loop1): Unmount and run xfs_repair [ 1502.308325][T17346] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:57:32 executing program 0: [ 1502.351075][T17346] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ 17:57:32 executing program 2: [ 1502.397866][T17346] 00000010: ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1502.450540][T17346] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1502.553317][T17346] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1502.619430][T17346] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1502.663032][T17346] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1502.693665][T17346] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:57:33 executing program 0: 17:57:33 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xffffffffffff0700, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0xd813) [ 1502.704660][T17346] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1502.778934][T17488] XFS (loop1): SB validate failed with error -117. 17:57:33 executing program 4: unshare(0x40000000) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) ioctl$SNDCTL_DSP_GETISPACE(0xffffffffffffffff, 0x8010500d, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101200, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x22c0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @remote}, 0xc) r0 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @remote}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000180)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0xd813) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000100)) setuid(0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 17:57:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003f000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1503.438480][T17526] IPVS: ftp: loaded support on port[0] = 21 17:57:34 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0xd813) [ 1503.812745][T17611] XFS (loop1): SB sanity check failed [ 1503.818417][T17611] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1503.857858][T17611] XFS (loop1): Unmount and run xfs_repair [ 1503.864125][T17611] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1503.968716][T17611] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1503.977684][T17611] 00000010: f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1503.986688][T17611] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1503.995773][T17611] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1504.004984][T17611] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1504.014046][T17611] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1504.023158][T17611] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1504.032390][T17611] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1504.041564][T17611] XFS (loop1): SB validate failed with error -117. 17:57:34 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xffffffffffffff7f, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1504.264456][T17611] XFS (loop1): SB sanity check failed [ 1504.277267][T17611] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1504.290893][T17611] XFS (loop1): Unmount and run xfs_repair [ 1504.298556][T17611] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1504.312166][T17611] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1504.329986][T17611] 00000010: f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1504.346645][T17611] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:57:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"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", 0x1000}}, 0x1006) [ 1504.362875][T17611] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1504.424620][T17611] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... 17:57:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1504.507409][T17611] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:57:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0xd813) [ 1504.580686][T17611] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1504.617899][T17611] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1504.617978][T17611] XFS (loop1): SB validate failed with error -117. 17:57:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001003f700000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1504.725601][ T2573] tipc: TX() has been purged, node left! [ 1504.775664][ T2573] tipc: TX() has been purged, node left! [ 1504.775979][ T2573] tipc: TX() has been purged, node left! 17:57:35 executing program 0: r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r0, 0x10, 0x0, 0x8004) [ 1505.338234][T17784] XFS (loop1): SB sanity check failed [ 1505.345810][T17784] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1505.467205][T17784] XFS (loop1): Unmount and run xfs_repair [ 1505.542170][T17784] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1505.569609][T17784] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1505.615629][T17784] 00000010: f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1505.633152][T17784] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1505.643858][T17784] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1505.653911][T17784] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1505.663823][T17784] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1505.673820][T17784] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1505.684000][T17784] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1505.694465][T17784] XFS (loop1): SB validate failed with error -117. [ 1505.843020][T17784] XFS (loop1): SB sanity check failed [ 1505.851525][T17784] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1505.889088][T17784] XFS (loop1): Unmount and run xfs_repair [ 1505.913885][T17784] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1505.947583][T17784] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 03 XFSB............ [ 1505.970817][T17784] 00000010: f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1505.992052][T17784] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1506.013231][T17784] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1506.034495][T17784] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1506.055763][T17784] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1506.069479][T17784] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1506.079345][T17784] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1506.089006][T17784] XFS (loop1): SB validate failed with error -117. 17:57:37 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) 17:57:37 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0)=0xffffffffffffffff, 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001001f800000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227c, 0x0) [ 1506.730518][T17816] XFS (loop1): SB sanity check failed [ 1506.736051][T17816] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1506.755885][T17816] XFS (loop1): Unmount and run xfs_repair [ 1506.763376][T17816] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1506.771501][T17816] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 01 XFSB............ [ 1506.782954][T17816] 00000010: f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1506.792048][T17816] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1506.801305][T17816] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1506.845592][T17816] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1506.915996][T17816] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1506.925861][T17816] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1506.936026][T17816] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1506.945389][T17816] XFS (loop1): SB validate failed with error -117. 17:57:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000ff00000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:38 executing program 2: unshare(0x2a000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4008ae6a, &(0x7f0000000000)) [ 1507.709809][T18046] XFS (loop1): SB sanity check failed [ 1507.715342][T18046] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1507.729598][T18046] XFS (loop1): Unmount and run xfs_repair [ 1507.736459][T18046] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1507.743910][T18046] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1507.754984][T18046] 00000010: ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1507.765154][T18046] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1507.777405][T18046] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1507.787674][T18046] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1507.801773][T18046] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1507.811286][T18046] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1507.820244][T18046] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1507.829220][T18046] XFS (loop1): SB validate failed with error -117. 17:57:38 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0x133) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100fff00000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:39 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x20800) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000880)={0x0, @nl, @can, @hci, 0x0, 0x0, 0x0, 0x0, 0xeaa8, &(0x7f0000000840)='wg1\x00', 0x346, 0xfff, 0x3}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000", @ANYRES32, @ANYRESDEC], 0x3, 0x0) syz_read_part_table(0x4c00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="02010500000000c70000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 17:57:39 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010ffff01000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1508.849748][T18285] XFS (loop1): SB sanity check failed [ 1508.855283][T18285] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1508.877363][T18285] XFS (loop1): Unmount and run xfs_repair [ 1508.895794][T18285] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1508.943471][T18285] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1508.952544][T18285] 00000010: ff 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1508.961620][T18285] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1508.970670][T18285] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1508.980248][T18285] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... 17:57:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) [ 1508.989368][T18285] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1508.998516][T18285] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1509.007754][T18285] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1509.016861][T18285] XFS (loop1): SB validate failed with error -117. [ 1509.159311][T18285] XFS (loop1): SB sanity check failed [ 1509.164983][T18285] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1509.212823][T18285] XFS (loop1): Unmount and run xfs_repair [ 1509.225902][T18285] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1509.249656][T18285] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ 17:57:39 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xffffffff000) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1509.351566][T18285] 00000010: ff 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:57:39 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1509.480529][T18285] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1509.500964][T18285] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1509.523391][T18285] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1509.565653][T18285] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1509.590422][T18285] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1509.608995][T18285] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:57:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1509.690244][T18285] XFS (loop1): SB validate failed with error -117. 17:57:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000004000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:40 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x98f904, 0x3, @value}) 17:57:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1510.204454][T18531] XFS (loop1): SB sanity check failed [ 1510.212708][T18531] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1510.248525][T18531] XFS (loop1): Unmount and run xfs_repair [ 1510.282525][T18531] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1510.354594][T18531] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1510.400354][T18531] 00000010: 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1510.427906][T18531] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1510.493091][T18531] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1510.569972][T18531] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1510.587207][T18531] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1510.605607][T18531] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1510.650785][T18531] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1510.707126][T18531] XFS (loop1): SB validate failed with error -117. 17:57:41 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:41 executing program 2: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$nbd(r0, &(0x7f0000000240), 0x10) fallocate(r0, 0x10, 0x0, 0x8004) 17:57:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:41 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:41 executing program 2: 17:57:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000000e000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) open(0x0, 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 1511.568306][T18681] XFS (loop1): SB sanity check failed [ 1511.582044][T18681] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1511.679730][T18681] XFS (loop1): Unmount and run xfs_repair [ 1511.762170][T18681] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1511.800311][T18681] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1511.845546][T18681] 00000010: 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1511.887228][T18681] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:57:42 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1511.947580][T18681] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1512.025665][T18681] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1512.035827][T18681] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1512.044697][T18681] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1512.097784][T18681] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1512.149270][T18681] XFS (loop1): SB validate failed with error -117. 17:57:42 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x10, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x800) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x181000, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) openat$cgroup_ro(r3, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) accept4(r2, 0x0, 0x0, 0x0) shutdown(r0, 0x7eac15b535613525) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1152c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000140), &(0x7f0000000200)=0x4) r6 = socket$bt_cmtp(0x1f, 0x3, 0x5) sendfile(r6, r5, &(0x7f00000001c0), 0xa198) 17:57:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1512.369132][T18681] XFS (loop1): SB sanity check failed [ 1512.383993][T18681] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1512.426616][T18681] XFS (loop1): Unmount and run xfs_repair [ 1512.459505][T18681] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1512.509771][T18681] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1512.545751][T18681] 00000010: 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1512.554792][T18681] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1512.580004][T18681] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1512.589889][T18681] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1512.620918][T18681] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1512.630519][T18681] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1512.640101][T18681] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1512.649403][T18681] XFS (loop1): SB validate failed with error -117. 17:57:43 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:43 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:43 executing program 2: socket$kcm(0x11, 0xa, 0x300) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000004) 17:57:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000007e000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1513.197977][T18835] XFS (loop1): SB sanity check failed [ 1513.205023][T18835] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1513.261741][T18835] XFS (loop1): Unmount and run xfs_repair [ 1513.281313][T18835] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1513.329034][T18835] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1513.340190][T18835] 00000010: 00 7e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .~.............. [ 1513.357286][T18835] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:57:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}, {}], 0x2, &(0x7f0000000140)={0x0, r1+30000000}, 0x0, 0x0) [ 1513.408843][T18835] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 17:57:43 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1513.512412][T18835] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1513.574886][T18835] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:57:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x0, 0x4) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1513.754983][T18835] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1513.872064][T18835] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:57:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1513.939535][T18835] XFS (loop1): SB validate failed with error -117. 17:57:44 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:45 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:45 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, 0x0, 0x0) getpgid(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) fcntl$getownex(r0, 0x10, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x102000004) 17:57:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010809698000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0), 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1514.828523][T19096] XFS (loop1): SB sanity check failed [ 1514.867870][T19096] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:57:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 17:57:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0), 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1514.966924][T19096] XFS (loop1): Unmount and run xfs_repair [ 1515.001698][T19096] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1515.043941][T19096] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 80 XFSB............ 17:57:45 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={0xffffffffffffffff, r3}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = accept4(r4, 0x0, 0x0, 0x0) shutdown(r5, 0x1) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x101, 0x2) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) [ 1515.106818][T19096] 00000010: 96 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:57:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1515.155600][T19096] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1515.262303][T19096] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1515.298916][T19096] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1515.325197][T19096] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1515.379724][T19096] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1515.391309][T19096] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1515.434406][T19096] XFS (loop1): SB validate failed with error -117. 17:57:46 executing program 2: 17:57:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:46 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0), 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000010000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:46 executing program 2: 17:57:46 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) sendto$inet6(r3, &(0x7f0000000200)="84372f1579041b2cd23a09c995c8fe545ab66531eb9b0c214000332287e2b9cde68b5a2e38e5fb6c67382f5ace859b3d87c000e24809c045273fd728248431738d928c68e2952497df03ba1ec0b3bbc5a950a52372d636bd4fb89d70350dbb539fdce6f0f565f9c7eac7e29eaf59193634dac2cb26097cef50021d5bde22e20b0f19365c54b8b3da71cb16a21146b34478a016a500f603bed4259d75bb4d376869654b3a4876eda09b05752580185b07e3d56fe8c5388dc154d05a2a274fe05950c1056e6799e4ba14ecf2bf8105cc945f47e674010500ce390ff889da2ce5a0ee961f4af35130", 0xe7, 0x20088018, &(0x7f0000000000)={0xa, 0x4e21, 0xffffff81, @mcast1, 0x7}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1516.398697][ T7181] XFS (loop1): SB sanity check failed [ 1516.404381][ T7181] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1516.433748][ T7181] XFS (loop1): Unmount and run xfs_repair [ 1516.440047][ T7181] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:57:46 executing program 2: [ 1516.449884][ T7181] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1516.459820][ T7181] 00000010: 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1516.469417][ T7181] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1516.478805][ T7181] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1516.488103][ T7181] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1516.497477][ T7181] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1516.506844][ T7181] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1516.516300][ T7181] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1516.525421][T19350] XFS (loop1): SB validate failed with error -117. 17:57:47 executing program 2: 17:57:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000020000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:47 executing program 2: [ 1517.295896][T19386] XFS (loop1): SB sanity check failed [ 1517.301436][T19386] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1517.345974][T19386] XFS (loop1): Unmount and run xfs_repair [ 1517.351801][T19386] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1517.389367][T19386] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1517.420419][T19386] 00000010: 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1517.433146][T19386] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1517.465239][T19386] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1517.483422][T19386] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1517.522229][T19386] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1517.555572][T19386] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1517.578362][T19386] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1517.646166][T19386] XFS (loop1): SB validate failed with error -117. [ 1517.768717][T17812] XFS (loop1): SB sanity check failed [ 1517.774532][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1517.787098][T17812] XFS (loop1): Unmount and run xfs_repair [ 1517.793177][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1517.806777][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:57:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:48 executing program 2: 17:57:48 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(0xffffffffffffffff, r4, &(0x7f00000001c0)=0xffffffffffffffff, 0xa196) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f0000000000)='mand\x00', 0x0, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:57:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1517.831995][T17812] 00000010: 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1517.905754][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1517.915043][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1517.924423][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1517.934523][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1517.950651][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1517.960126][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1517.969404][T19386] XFS (loop1): SB validate failed with error -117. [ 1518.063697][T19422] IPVS: ftp: loaded support on port[0] = 21 17:57:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x18, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x2, 0x0, 0x0, 0x40d}]}}]}}]}, 0x44}}, 0x0) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 17:57:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000030000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:49 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1518.529837][T17812] XFS (loop1): SB sanity check failed [ 1518.536075][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1518.548918][T17812] XFS (loop1): Unmount and run xfs_repair [ 1518.554803][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1518.596988][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1518.612104][T17812] 00000010: 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1518.624526][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:57:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1518.643755][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1518.677991][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1518.694030][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1518.707834][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1518.717561][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1518.727939][T19460] XFS (loop1): SB validate failed with error -117. [ 1518.735495][ T2524] tipc: TX() has been purged, node left! [ 1518.838042][T19554] IPVS: ftp: loaded support on port[0] = 21 17:57:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000040000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:49 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) 17:57:49 executing program 5: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) listen(r0, 0x9) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) ioctl$NBD_CLEAR_QUE(r2, 0xab05) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:57:49 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1519.301090][T17812] XFS (loop1): SB sanity check failed [ 1519.307915][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1519.338038][T17812] XFS (loop1): Unmount and run xfs_repair [ 1519.367614][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1519.392865][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1519.403996][T17812] 00000010: 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1519.413587][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1519.423251][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1519.432937][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1519.442673][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1519.452069][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:57:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:50 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1519.461730][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1519.471151][T19566] XFS (loop1): SB validate failed with error -117. 17:57:50 executing program 2: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0xf}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) [ 1519.740812][T19696] IPVS: ftp: loaded support on port[0] = 21 17:57:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000050000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:50 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x1b, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) [ 1520.296410][T17812] XFS (loop1): SB sanity check failed [ 1520.308662][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1520.336708][T17812] XFS (loop1): Unmount and run xfs_repair [ 1520.343155][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1520.353053][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1520.362916][T17812] 00000010: 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1520.375276][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:57:50 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1520.385409][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1520.398668][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1520.409061][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1520.419187][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:57:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1520.443331][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1520.475525][T19814] XFS (loop1): SB validate failed with error -117. 17:57:51 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:51 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x10, 0x80000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0xc7) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) 17:57:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call], {0x56}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) [ 1520.767583][T19943] IPVS: ftp: loaded support on port[0] = 21 17:57:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000060000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:51 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) [ 1521.398521][T20064] XFS (loop1): SB sanity check failed [ 1521.404161][T20064] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1521.499626][T20064] XFS (loop1): Unmount and run xfs_repair 17:57:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1521.559179][T20064] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1521.611972][T20064] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1521.631353][T20064] 00000010: 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1521.645391][T20064] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1521.656401][T20064] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1521.677557][T20064] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1521.687374][T20064] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1521.696786][T20064] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1521.706298][T20064] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1521.716011][T20064] XFS (loop1): SB validate failed with error -117. 17:57:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 1521.960069][T20064] XFS (loop1): SB sanity check failed [ 1521.968590][T20064] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1522.007472][T20064] XFS (loop1): Unmount and run xfs_repair [ 1522.028132][T20064] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1522.041386][T20129] IPVS: ftp: loaded support on port[0] = 21 17:57:52 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1522.050307][T20064] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:57:52 executing program 5: listen(0xffffffffffffffff, 0x4000000043) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f0000000200)=0xfffffc38) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYBLOB="76000000e64c772ff3d61ac642b6a108c69349d4b005dab21dda9f6e7688b89d179a2f8b59e30d89278d1f419f1d2065eeb4634d16618eda264d4502f4cc9c9c5dea5b347af89000000000000000000a4aae8e8ccf4c942cd6e1abd23f05f0ef0b15ba8c62135b218b34347007b09ab532f508356ea5738fd331207bb65971a2fa661b4b9be46013d5bbeed70dfd3a1ba99903a62b4d4ab056bf63796386d8383b02063da9"], &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={r2, 0x7}, &(0x7f00000000c0)=0x8) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x1}, &(0x7f0000000140)=0x8) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) r3 = accept4(r1, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1522.157281][T20064] 00000010: 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.260333][T20064] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1522.269677][T20064] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1522.278849][T20064] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1522.288040][T20064] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1522.297197][T20064] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:57:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x46) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0x2) [ 1522.308390][T20064] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.317536][T20064] XFS (loop1): SB validate failed with error -117. 17:57:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000070000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:53 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:57:53 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_aout(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="cb"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000009002000000070000c800000060010000c8000000c8000080f8010000f8010000f8010000f8010000f80100000400000000000000000000000000000000000000eeff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000c8000000000000f9ffffffffffffff000000000000003000616464727479706500000000000000000000000000fa000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000e0000001ac1414bb0000000000000000677265300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000000000000ff7f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028005345540000000000000000000000000000000000000000000000000000010000040000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1522.958543][T20321] XFS (loop1): SB sanity check failed [ 1523.014368][T20321] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1523.142695][T20336] x_tables: duplicate underflow at hook 2 [ 1523.156454][T20321] XFS (loop1): Unmount and run xfs_repair [ 1523.195680][T20321] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1523.201973][T20389] IPVS: ftp: loaded support on port[0] = 21 17:57:53 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1523.255901][ T2524] tipc: TX() has been purged, node left! [ 1523.262742][ T2524] tipc: TX() has been purged, node left! [ 1523.279188][T20321] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1523.326016][T20321] 00000010: 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1523.335172][T20321] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1523.344328][T20321] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1523.353381][T20321] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1523.362527][T20321] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:57:53 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB="76000000e64c772ff3d61ac642b6a108c69349d4b005dab21dda9f6e7688b89d179a2f8b59e30d89278d1f419f1d2065ee9c9c5dea5b347af89000000000000000000a4aae8e8ccf4c942cd6e1abd23f05f0ef0b15ba8c62135b218b34347007b09ab532f508356ea5738fd331207bb65971a2fa661b4b9be46013d5bbeed70dfd3a1ba99903a62b4d4ab056bf63796386d8383b02063da900"/165], &(0x7f0000000140)=0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x40, 0x800, 0x2, 0x6, 0xfffffffc, 0x2, 0x688, 0xc9ce, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e21, 0x8, @empty}}}, &(0x7f0000000140)=0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r4, 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:57:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) 17:57:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000009002000000070000c800000060010000c8000000c8000080f8010000f8010000f8010000f8010000f80100000400000000000000000000000000000000000000eeff000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000c8000000000000f9ffffffffffffff000000000000003000616464727479706500000000000000000000000000fa000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000e0000001ac1414bb000000000000000067e765300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000000000000ff7f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028005345540000000000000000000000000000000000000000000000000000010000040000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000002000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x40000000000005a, 0x0) [ 1523.385861][T20321] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1523.395714][ T2524] tipc: TX() has been purged, node left! [ 1523.402958][ T2524] tipc: TX() has been purged, node left! [ 1523.445870][T20321] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1523.475529][T20321] XFS (loop1): SB validate failed with error -117. 17:57:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() select(0x80c9, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2a) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffe, 0x0, 0xa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 17:57:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1523.836172][T20659] IPVS: ftp: loaded support on port[0] = 21 17:57:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000080000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKROSET(r0, 0x125d, 0x0) 17:57:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) 17:57:54 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) [ 1524.266575][T17812] XFS (loop1): SB sanity check failed [ 1524.272153][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1524.291538][T17812] XFS (loop1): Unmount and run xfs_repair [ 1524.318877][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1524.335660][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1524.344646][T17812] 00000010: 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:57:54 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000000)="77720526623b88aaca1ed63377ce6b83a7214fe146000000000000", 0x1b, 0x17ece917b52d5192, &(0x7f000005ffe4)={0xa, 0x4e20, 0x4000, @local}, 0xffffffffffffffee) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x800) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, 0x0, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x100, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4044) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) 17:57:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\vem1\xc1\xf8\xa6\xc1\a\xae/\x81\x8dN&\ad\x9aJ\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\xe13\xfd\x9f\'\xf2\x99\"\x1e\xa6[\x0e\x97t\xd4\x86\xe4\xa8\xcf\xb8\x86\x8b&\x9d\xcf\xa1\xab\xaf\xf5z\xa7?\rpjv\x05m\xfd\x89MbRz?\ft\xd2!\xe8k\xc4sc\x18b\xb6\xfc\xbe\x8b\x86F\xfdT{M\xd5\x03Y\x90tM\xa1>Q\x97$\x1b\xd7T\xf79\x06+\x06E\"\x19\x90\xba\xaf\x05\x10\x156\xa8\x9a\x99\xbd\x1a\x99\'\xe5l\xc5{7\rca|\x7f`\xb88*\xcf;\n\x98\xd8\'\xf8[\xb3\xa4\x16\\\xfak\x83c#\xa4\xea\x03p\x9c\n\xb7h\xdaN\xb6\xb1\x9f\x87SC\xe4:\xb4(H\x8f\x18/\xbe* \x02\xc9\xe9V\x0fF\x12\x0e\x8b\xb8\xcf\x00\x83\xcb!0\b\xd3d\xb3_\xc2\xf8\f\xa6A`\xdf)\x91(\x9a\xac\x12\xc7\xb7\x11\xa9S\xd2aX\xa4\xed\xa2\x7f\xf2#\x9fH4\xa9\xb9\x90\xe4\xad\x05\x9aaaW\x1d\x94\x85\'O]\x84\x8d\xef\xe4^%\xc7\xd5\x85\x8f\x86\xcb\xa2A2\xd1n\xe6\xb0\xcf\td\x88\x86\xa2\x97h\x85\x96R\xa7tO6\x0f\xc9\x16i\x06\x0f\x1f\x13H3\xc3\xdf\xde\xb2Ua\xde\v\xf8\xc0\xcc\xe1\x14\xea\xd7\x85\xf7\xe8v\xf4\x8b\xc1\xec\xce\x8c\x0f&\xe7g\x92*\x8d\xb2Q\xbez\x93\x860\x8b\x11\x9aR\xee\x06\x1b8\x13\x9ch\x8f\x14I?4X\xaf\xfb\xa4H \x90\x91d\xb5\x8b\x00\x00\x00\x00\x00\x00\x00\xe2\xed\x83\xf5\xe6a\x86G.\xe41', 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="34e7ff000000351000007f12b579fbec9961f093751f85a8f50b17eeffff0093750ecbd956dfff01000000000200389c1f42d3a9bdd962f67087f744de2c074877000445a535626e05b645ca18b67561e2fcda4806d40ce1fb6cc6fe46b80041d3682d1ae8ba915979b9e24b94108e2ffdffffffb6600d1e9f0bc4858b225096a9f1e5c046812081b646b82ec728705be751423250b8b837a8c0b5c78497ce01471840150735eb5f1fa6ad8a96e86276fcaf4d9a013424200d2d11af25098583fa490d5e00010000010000008b92fee4177ea5fc9626d7ec7152de010000000000000088d2596d94177cb686946c209934adf1a07a10eaf8cfffff4753c735eb6f2100b2aef69c9258081127491390d8c39a76e9185d179fc9d82341d0034634838dace39a435ba43eaf66e0ddcf8cb8189765e17577459df703000004f509554b4f498c693903cd204cb81a63491da9252f707d3bd350cddee391e8e463571b214312e1a361a19ebbcc93cef2a1dd8900b14e1e56cb1f6b2fa599c3e6cae71f0fb44ed978903f30171d802eb28732baac3f79c91c3dc0b564f8f5b94e90b5e99f39fd47b267e6c1ceaca448c438fb3b5cddb2d0aea8f03e1764dae058bfcfaf129e7c08df6dfb0a065c6b25916253c6fd2bebdf7faff00ab2b31c4d03da7f948a885fb78f916512b16a1e625bbf9a6ec032a7628e7ee8c9da64da217e5b1ae4c02fa06c996611a3df3ad170bc4b3f9838bbcaf9bb3b5a43e483adec11e525324cb2227cc40aa40697a946f01442268118b66126c4f4d668fea601f61c5667613d57537dde4f0d13cf3c316c2c0f13eafc56319f370d8fada7f70d1bad59d1ca6f1a591234d0b48ba86f1f0753094e630fec6d708e77a19959101a2ccf59342d4b306700"/661], 0x118) sendfile(r1, r1, &(0x7f0000001000), 0xffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) [ 1524.383347][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1524.409822][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1524.441406][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1524.468371][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:57:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300), 0x0, 0x0) [ 1524.500943][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1524.522924][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1524.540592][T20680] XFS (loop1): SB validate failed with error -117. 17:57:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300), 0x0, 0x0) 17:57:55 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000090000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1525.323575][T20818] XFS (loop1): SB sanity check failed [ 1525.335624][T20818] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1525.350405][T20818] XFS (loop1): Unmount and run xfs_repair [ 1525.356583][T20818] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1525.364041][T20818] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1525.376512][T20818] 00000010: 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1525.387727][T20818] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1525.397452][T20818] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1525.415120][T20818] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1525.527540][T20818] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1525.577846][T20818] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1525.626677][T20818] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1525.672823][T20818] XFS (loop1): SB validate failed with error -117. 17:57:56 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\vem1\xc1\xf8\xa6\xc1\a\xae/\x81\x8dN&\ad\x9aJ\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\xe13\xfd\x9f\'\xf2\x99\"\x1e\xa6[\x0e\x97t\xd4\x86\xe4\xa8\xcf\xb8\x86\x8b&\x9d\xcf\xa1\xab\xaf\xf5z\xa7?\rpjv\x05m\xfd\x89MbRz?\ft\xd2!\xe8k\xc4sc\x18b\xb6\xfc\xbe\x8b\x86F\xfdT{M\xd5\x03Y\x90tM\xa1>Q\x97$\x1b\xd7T\xf79\x06+\x06E\"\x19\x90\xba\xaf\x05\x10\x156\xa8\x9a\x99\xbd\x1a\x99\'\xe5l\xc5{7\rca|\x7f`\xb88*\xcf;\n\x98\xd8\'\xf8[\xb3\xa4\x16\\\xfak\x83c#\xa4\xea\x03p\x9c\n\xb7h\xdaN\xb6\xb1\x9f\x87SC\xe4:\xb4(H\x8f\x18/\xbe* \x02\xc9\xe9V\x0fF\x12\x0e\x8b\xb8\xcf\x00\x83\xcb!0\b\xd3d\xb3_\xc2\xf8\f\xa6A`\xdf)\x91(\x9a\xac\x12\xc7\xb7\x11\xa9S\xd2aX\xa4\xed\xa2\x7f\xf2#\x9fH4\xa9\xb9\x90\xe4\xad\x05\x9aaaW\x1d\x94\x85\'O]\x84\x8d\xef\xe4^%\xc7\xd5\x85\x8f\x86\xcb\xa2A2\xd1n\xe6\xb0\xcf\td\x88\x86\xa2\x97h\x85\x96R\xa7tO6\x0f\xc9\x16i\x06\x0f\x1f\x13H3\xc3\xdf\xde\xb2Ua\xde\v\xf8\xc0\xcc\xe1\x14\xea\xd7\x85\xf7\xe8v\xf4\x8b\xc1\xec\xce\x8c\x0f&\xe7g\x92*\x8d\xb2Q\xbez\x93\x860\x8b\x11\x9aR\xee\x06\x1b8\x13\x9ch\x8f\x14I?4X\xaf\xfb\xa4H \x90\x91d\xb5\x8b\x00\x00\x00\x00\x00\x00\x00\xe2\xed\x83\xf5\xe6a\x86G.\xe41', 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/661], 0x118) sendfile(r1, r1, &(0x7f0000001000), 0xffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:57:56 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63db"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300), 0x0, 0x0) 17:57:56 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = semget$private(0x0, 0x0, 0x0) semctl$IPC_INFO(r6, 0x3, 0x3, &(0x7f00000004c0)=""/163) semctl$IPC_INFO(r6, 0x2, 0x3, &(0x7f00000000c0)=""/11) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xfffffffffffffff8, 0x101300) [ 1526.011609][T20851] IPVS: ftp: loaded support on port[0] = 21 17:57:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100000000a0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) clone(0x5b7a8cca550a211f, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:57:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x1, 0x0) 17:57:57 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1526.527142][T17812] XFS (loop1): SB sanity check failed [ 1526.532962][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1526.573170][T17812] XFS (loop1): Unmount and run xfs_repair [ 1526.600460][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1526.625518][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1526.634444][T17812] 00000010: 00 00 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1526.643475][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1526.652488][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1526.661461][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1526.670413][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1526.679397][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1526.688573][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1526.718195][T20863] XFS (loop1): SB validate failed with error -117. [ 1526.844822][T20879] IPVS: ftp: loaded support on port[0] = 21 [ 1526.853736][T17812] XFS (loop1): SB sanity check failed [ 1526.859387][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:57:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x1, 0x0) [ 1526.889965][T17812] XFS (loop1): Unmount and run xfs_repair [ 1526.897946][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1526.906226][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1526.915201][T17812] 00000010: 00 00 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1526.925008][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1526.935043][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1526.945010][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1526.955092][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1526.965025][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1526.974046][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1526.983009][T20863] XFS (loop1): SB validate failed with error -117. 17:57:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100000000c0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:57:57 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'macsec0\x00', {0x2, 0x4e22, @multicast2}}) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r4 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1527.768966][T17812] XFS (loop1): SB sanity check failed [ 1527.784823][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1527.860636][T17812] XFS (loop1): Unmount and run xfs_repair [ 1527.880270][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1527.889056][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1527.899254][T17812] 00000010: 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1527.910665][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1527.921221][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1527.932344][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1527.942949][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1527.953238][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1527.963370][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1527.973912][T21000] XFS (loop1): SB validate failed with error -117. [ 1528.174872][T21000] XFS (loop1): SB sanity check failed [ 1528.191396][T21000] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1528.244396][T21000] XFS (loop1): Unmount and run xfs_repair [ 1528.260832][T21000] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1528.281195][T21000] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1528.292810][T21000] 00000010: 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1528.302876][T21000] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1528.312824][T21000] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1528.325858][T21000] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1528.335709][T21000] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1528.356390][T21000] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1528.389365][T21000] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1528.405614][T21000] XFS (loop1): SB validate failed with error -117. 17:57:59 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:57:59 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x1, 0x0) 17:57:59 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) clone(0x5b7a8cca550a211f, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1528.609396][T21029] IPVS: ftp: loaded support on port[0] = 21 17:57:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100000000d0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1528.794066][ T2524] tipc: TX() has been purged, node left! [ 1528.800070][ T2524] tipc: TX() has been purged, node left! [ 1528.841337][ T2524] tipc: TX() has been purged, node left! [ 1528.884615][ T2524] tipc: TX() has been purged, node left! [ 1528.886066][T21036] IPVS: ftp: loaded support on port[0] = 21 17:57:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000e40)}], 0x1, 0x0) 17:57:59 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:57:59 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x180, 0x1, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000080), 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) 17:57:59 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0xe) ptrace$cont(0x18, r3, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000002580)=ANY=[@ANYPTR=&(0x7f0000002400)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESOCT=r3, @ANYRESDEC=r2, @ANYRES16=0x0, @ANYRES32, @ANYRES64, @ANYRESOCT=r0], @ANYRESOCT=0x0, @ANYRESDEC, @ANYRESHEX, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYRES64, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX, @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRES64, @ANYPTR64, @ANYRES16=r0], @ANYPTR64=&(0x7f0000002700)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRESDEC, @ANYRES32], @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYPTR]], @ANYBLOB="93bd9eb4c3933872ff038c147927f8e34212a38ffa2c68dc111c8e8ad9", @ANYBLOB="34dd0074cdc7e6464dd9050e6d222d973c2a45bcac4f6df4becc3e71ab824586a2d3e9cd20af639bf9c29c118aa04513123dc4e02ee3ce3ada8c5cb10fbeed35211f140a607092ae8027cee6c3925224a19ad1b80ed0fa3ef75b119092af7b175d3903e45e5aec7d2812c8094f2c8ddd695e03e61eb9299c200d16243ba96d72a6a640671dbf22aebc31fa3128b08b06f2c5e97c79a53024d2606a04b224afcc07502783d955bc92de20f75cf16010e4a658d9598677b440bbf4046060e752d5ea74f0fa4e7323310faa05261bd7b95df234dcb6ac976ee249a0a5cdfa94885f3a6cc9"], 0x14d) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r4 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1529.336621][T17812] XFS (loop1): SB sanity check failed [ 1529.342367][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1529.398064][T17812] XFS (loop1): Unmount and run xfs_repair [ 1529.405571][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1529.413297][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1529.423244][T17812] 00000010: 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1529.432420][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1529.441765][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1529.451156][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1529.460461][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1529.469823][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1529.479215][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1529.488515][T21140] XFS (loop1): SB validate failed with error -117. 17:58:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000e40)}], 0x1, 0x0) [ 1529.658487][T17812] XFS (loop1): SB sanity check failed [ 1529.664605][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1529.677373][T17812] XFS (loop1): Unmount and run xfs_repair [ 1529.683453][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:58:00 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14, 0x4, 0x1, 0x3, 0x0, 0x0, {0x3}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1529.704056][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1529.713656][T17812] 00000010: 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1529.724826][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1529.734207][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1529.744216][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1529.754890][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1529.765022][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1529.774416][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1529.784196][T21140] XFS (loop1): SB validate failed with error -117. 17:58:00 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0xffffffffffffffa6, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @mcast2}, 0x11) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socket$kcm(0x29, 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x380, 0x240, 0x0, 0xffffffff, 0x240, 0x170, 0x2e8, 0x2e8, 0xffffffff, 0x2e8, 0x2e8, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @port=0x4e24, @icmp_id=0x67}}}}, {{@ip={@loopback, @multicast2, 0xff000000, 0xffffffff, 'veth0_to_bridge\x00', 'wg1\x00', {}, {0xff}}, 0x0, 0x90, 0xc8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @multicast2, @dev={0xac, 0x14, 0x14, 0x2d}, @port=0x4e22, @port=0x4e24}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x3, "99a1", 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @empty, @broadcast, @port=0x4e22, @port=0x4e22}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x10, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @gre_key=0xa58, @icmp_id=0x68}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) sendfile(r5, r5, &(0x7f00000001c0)=0xffffffffffffffff, 0x1) [ 1530.384404][T21381] x_tables: duplicate underflow at hook 1 17:58:01 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000e40)}], 0x1, 0x0) 17:58:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000100000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:01 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0)}], 0x1, 0x0) [ 1531.161297][T21398] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1531.213741][T21404] IPVS: ftp: loaded support on port[0] = 21 17:58:01 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) modify_ldt$write(0x1, &(0x7f0000000300)={0x2, 0x20000800, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1}, 0x10) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0x4, 0xa2000, 0x200, r0, 0x0, &(0x7f00000000c0)={0x0, 0x800, [], @p_u8=&(0x7f0000000080)=0x2}}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) r4 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:58:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1531.387810][T17812] XFS (loop1): SB sanity check failed [ 1531.393336][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1531.481655][T17812] XFS (loop1): Unmount and run xfs_repair [ 1531.507444][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1531.543177][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1531.582503][T17812] 00000010: 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1531.606859][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1531.631771][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 17:58:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0)}], 0x1, 0x0) [ 1531.656551][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1531.681224][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1531.696048][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:02 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1531.752868][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1531.806949][T21397] XFS (loop1): SB validate failed with error -117. 17:58:02 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0)}], 0x1, 0x0) [ 1532.276944][T21535] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:03 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 17:58:03 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584eca"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003150000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:03 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) symlinkat(&(0x7f0000000000)='./file0\x00', r5, &(0x7f00000000c0)='./file0\x00') write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:58:03 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1533.019679][T21555] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1533.035670][T21557] XFS (loop1): SB sanity check failed [ 1533.045542][T21557] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1533.121511][T21557] XFS (loop1): Unmount and run xfs_repair [ 1533.132049][T21575] IPVS: ftp: loaded support on port[0] = 21 [ 1533.161501][T21557] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1533.177446][T21557] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1533.204394][T21557] 00000010: 00 03 15 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1533.255590][T21557] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:58:03 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1533.331099][T21557] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1533.351116][T21557] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1533.362101][T21557] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1533.372961][T21557] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1533.382504][T21557] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1533.392892][T21557] XFS (loop1): SB validate failed with error -117. 17:58:03 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x4000) r0 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)='net/sockstat\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='timerslack_ns\x00') write$UHID_INPUT(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000017c0), 0xb) tkill(r0, 0x9) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x0, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0x1}]}) [ 1533.605761][T21785] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:04 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:04 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) [ 1533.974194][T21902] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:04 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r1, @ANYRES16=r0], 0x19) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1534.365596][ T2524] tipc: TX() has been purged, node left! [ 1534.410064][ T2524] tipc: TX() has been purged, node left! [ 1534.417740][ T2524] tipc: TX() has been purged, node left! 17:58:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:05 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000004}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000080)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) 17:58:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000200000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:05 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) [ 1534.810938][T22018] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1534.922297][T26324] XFS (loop1): SB sanity check failed [ 1534.927899][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:58:05 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) 17:58:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1534.974433][T26324] XFS (loop1): Unmount and run xfs_repair [ 1534.986091][T22233] IPVS: ftp: loaded support on port[0] = 21 [ 1535.013055][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1535.051434][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1535.094651][T26324] 00000010: 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 .. ............. [ 1535.117172][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1535.153606][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1535.172433][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1535.181892][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1535.194919][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0xa) [ 1535.219892][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1535.232636][T22240] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1535.256001][T22021] XFS (loop1): SB validate failed with error -117. 17:58:05 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) sendfile(r5, r6, &(0x7f00000001c0), 0xa198) [ 1535.471604][T22021] XFS (loop1): SB sanity check failed [ 1535.505646][T22021] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:58:06 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:06 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e1"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1535.651668][T22258] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1535.674447][T22021] XFS (loop1): Unmount and run xfs_repair [ 1535.745788][T22021] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1535.824516][T22021] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:58:06 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1535.916527][T22021] 00000010: 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 .. ............. [ 1535.975608][T22021] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1536.004506][T22021] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1536.044903][T22021] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1536.100357][T22021] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1536.134609][T22021] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1536.183168][T22021] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1536.197457][T22369] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1536.219669][T22021] XFS (loop1): SB validate failed with error -117. 17:58:07 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:07 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:07 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) lstat(0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 17:58:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000010200000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:07 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x40100, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000000)={0x40002010}) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r5 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r5, 0x1) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) [ 1536.813217][T22482] XFS (loop1): SB sanity check failed [ 1536.821566][T22482] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1536.834511][T22482] XFS (loop1): Unmount and run xfs_repair [ 1536.841148][T22482] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1536.849369][T22482] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1536.859259][T22482] 00000010: 00 10 20 00 00 00 00 00 00 00 00 00 00 00 00 00 .. ............. [ 1536.868800][T22482] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1536.878895][T22482] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1536.928727][T22482] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1536.954988][T22496] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1536.963761][T22482] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1536.974396][T22482] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1536.983724][T22482] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1536.992964][T22482] XFS (loop1): SB validate failed with error -117. [ 1536.997838][T22500] IPVS: ftp: loaded support on port[0] = 21 17:58:07 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x4000) r0 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) syz_open_procfs(r1, 0x0) syz_open_procfs(0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000017c0), 0xb) tkill(r0, 0x9) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x0, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0x1}]}) [ 1537.232102][T22482] XFS (loop1): SB sanity check failed [ 1537.237920][T22482] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1537.255740][T22482] XFS (loop1): Unmount and run xfs_repair [ 1537.261668][T22482] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1537.336716][T22613] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1537.357753][T22482] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1537.436333][T22482] 00000010: 00 10 20 00 00 00 00 00 00 00 00 00 00 00 00 00 .. ............. [ 1537.471163][T22482] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:58:08 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1537.499503][T22482] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 17:58:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1537.576225][T22482] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1537.646950][ T27] audit: type=1804 audit(1585850288.136:122): pid=22620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1579/file0" dev="sda1" ino=16882 res=1 [ 1537.675912][T22482] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1537.716380][T22482] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1537.784336][T22482] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1537.805513][ T27] audit: type=1804 audit(1585850288.196:123): pid=22494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1579/file0" dev="sda1" ino=16882 res=1 [ 1537.858027][T22482] XFS (loop1): SB validate failed with error -117. [ 1537.895261][T22624] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x4000) r0 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) syz_open_procfs(r1, 0x0) syz_open_procfs(0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000017c0), 0xb) tkill(r0, 0x9) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x0, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0x1}]}) [ 1537.948715][ T27] audit: type=1804 audit(1585850288.196:124): pid=22620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1579/file0" dev="sda1" ino=16882 res=1 17:58:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e188"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:09 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:09 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="4660406da55cf566f027983903088ec6300a8cacbcc7450997f8a19449bd820d67239a0481c374c3fc344426f63457f07e829fae28f0ed61a643c1de9e4bae4ed50e519381186ce1732e6b8b032fe26179d58055ca70a0ef5577654921254a8df5af5c20de3acd4c21fb66c317845487c50055d580cec8de37e6adc9369f001edfc759f5c253c683a609b65be6f3d0045bdd2e8b257b5f3792790d5768832e7165960e7a55eb207b539a", 0xaa, 0x8000, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @empty, 0x4}, 0x1c) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000200)=0x54) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(0xffffffffffffffff, r2, &(0x7f0000000240), 0x1) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) pipe2$9p(&(0x7f0000000000), 0x800) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(0xffffffffffffffff, 0x40044103, &(0x7f00000000c0)=0x6) 17:58:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000220000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x4000) r0 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) syz_open_procfs(r1, 0x0) syz_open_procfs(0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000017c0), 0xb) tkill(r0, 0x9) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x0, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0x1}]}) 17:58:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1538.770069][ T2524] tipc: TX() has been purged, node left! [ 1538.789581][ T2524] tipc: TX() has been purged, node left! [ 1538.809126][T22749] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1538.834230][ T2524] tipc: TX() has been purged, node left! 17:58:09 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:09 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000600)=[{}, {0x3, 0xfffd}], 0x2) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 17:58:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1539.090234][T22859] IPVS: ftp: loaded support on port[0] = 21 [ 1539.118469][T21545] XFS (loop1): SB sanity check failed [ 1539.124039][T21545] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1539.136410][T22869] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1539.136410][T22869] The task syz-executor.0 (22869) triggered the difference, watch for misbehavior. [ 1539.162130][T21545] XFS (loop1): Unmount and run xfs_repair [ 1539.168399][T21545] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1539.176143][T21545] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1539.185287][T21545] 00000010: 00 00 22 00 00 00 00 00 00 00 00 00 00 00 00 00 .."............. [ 1539.194478][T21545] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1539.203662][T21545] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1539.212785][T21545] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1539.221991][T21545] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1539.231057][T21545] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1539.240080][T21545] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1539.251742][T22761] XFS (loop1): SB validate failed with error -117. 17:58:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000230000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:10 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1539.831822][T22981] XFS (loop1): SB sanity check failed [ 1539.844998][T22981] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1539.895695][T22981] XFS (loop1): Unmount and run xfs_repair [ 1539.914636][T22981] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1539.972409][T22981] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1539.995500][T22981] 00000010: 00 00 23 00 00 00 00 00 00 00 00 00 00 00 00 00 ..#............. [ 1540.004470][T22981] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1540.013526][T22981] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1540.023404][T22981] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1540.032735][T22981] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1540.041736][T22981] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1540.050775][T22981] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1540.065628][T22981] XFS (loop1): SB validate failed with error -117. [ 1540.221578][T22981] XFS (loop1): SB sanity check failed [ 1540.238431][T22981] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1540.303219][T22981] XFS (loop1): Unmount and run xfs_repair [ 1540.327869][T22981] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1540.355123][T22981] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1540.397752][T22981] 00000010: 00 00 23 00 00 00 00 00 00 00 00 00 00 00 00 00 ..#............. [ 1540.426769][T22981] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1540.448030][T22981] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1540.477434][T22981] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1540.509021][T22981] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1540.548910][T22981] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1540.569851][T22981] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1540.591954][T22981] XFS (loop1): SB validate failed with error -117. 17:58:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100000003f0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:11 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:11 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:11 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) fchdir(r5) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:58:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:11 executing program 0: msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a'], 0x1, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) 17:58:11 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) getpeername$inet(r0, 0x0, &(0x7f0000000040)) [ 1541.104309][T23114] IPVS: ftp: loaded support on port[0] = 21 [ 1541.271096][T23120] XFS (loop1): SB sanity check failed [ 1541.278439][T23120] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1541.295826][T23120] XFS (loop1): Unmount and run xfs_repair [ 1541.301957][T23120] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1541.422607][T23120] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1541.433879][T23120] 00000010: 00 00 3f 00 00 00 00 00 00 00 00 00 00 00 00 00 ..?............. [ 1541.449971][T23120] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1541.472090][T23120] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1541.513693][T23120] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1541.569559][T23120] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:12 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1541.610000][T23120] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1541.645098][T23120] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1541.673553][T23120] XFS (loop1): SB validate failed with error -117. [ 1541.745762][ T2524] tipc: TX() has been purged, node left! 17:58:12 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000400000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:12 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1542.217092][T23264] IPVS: ftp: loaded support on port[0] = 21 [ 1542.224762][T23254] XFS (loop1): SB sanity check failed [ 1542.248041][T23254] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:58:12 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:12 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x0, {{0x2, 0x0, @loopback}}}, 0x88) [ 1542.330150][T23254] XFS (loop1): Unmount and run xfs_repair [ 1542.360177][T23254] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:58:12 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0x2000000a198) [ 1542.391412][T23254] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1542.446770][T23269] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1542.482263][T23254] 00000010: 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 ..@............. [ 1542.527118][T23254] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:58:13 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1542.577445][T23254] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1542.599442][T23254] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1542.672300][T23254] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:13 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000280)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0xee01}}) [ 1542.719508][T23254] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1542.775532][T23254] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:13 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1542.837546][T23382] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1542.920579][T23254] XFS (loop1): SB validate failed with error -117. 17:58:13 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) getdents(r0, 0x0, 0x0) 17:58:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000001400000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:14 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, 0x0, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:14 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1543.641152][T23501] XFS (loop1): SB sanity check failed [ 1543.652375][T23501] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1543.667602][T23501] XFS (loop1): Unmount and run xfs_repair [ 1543.742662][T23501] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:58:14 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:14 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xe0c) r1 = socket$inet6(0xa, 0x0, 0x0) listen(r1, 0x4000000043) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r2, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:58:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) getdents(r0, 0x0, 0x0) [ 1543.834082][T23501] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1543.883148][T23501] 00000010: 00 01 40 00 00 00 00 00 00 00 00 00 00 00 00 00 ..@............. [ 1543.909749][T23514] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1543.945832][T23501] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1543.954808][T23501] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1544.024838][T23529] IPVS: ftp: loaded support on port[0] = 21 17:58:14 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1544.117472][T23501] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1544.143334][T23501] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:14 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1544.204696][T23501] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1544.273601][T23501] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:14 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, 0x0, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1544.382149][T23501] XFS (loop1): SB validate failed with error -117. [ 1544.429809][T23633] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000460000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:15 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:15 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r6 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) sendfile(r5, r6, &(0x7f00000001c0), 0xa198) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) [ 1545.039072][T23750] XFS (loop1): SB sanity check failed [ 1545.044635][T23750] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1545.065850][T23750] XFS (loop1): Unmount and run xfs_repair [ 1545.071845][T23750] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1545.111952][T23636] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1545.135244][T23636] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1545.147778][T23636] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1545.158983][T23750] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1545.168283][T23750] 00000010: 00 00 46 00 00 00 00 00 00 00 00 00 00 00 00 00 ..F............. [ 1545.181049][T23636] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1545.190258][T23750] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1545.204146][T23750] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1545.214026][T23750] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1545.222964][T23750] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1545.231906][T23750] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1545.241485][T23750] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1545.250541][T23750] XFS (loop1): SB validate failed with error -117. 17:58:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, 0x0, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1545.446224][T23750] XFS (loop1): SB sanity check failed [ 1545.501654][T23750] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1545.519555][T23769] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:16 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1545.783773][T23750] XFS (loop1): Unmount and run xfs_repair [ 1545.856753][T23750] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1545.864474][T23750] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1545.875542][T23750] 00000010: 00 00 46 00 00 00 00 00 00 00 00 00 00 00 00 00 ..F............. [ 1545.940447][T23750] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1546.005955][T23750] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1546.065027][T23750] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1546.071148][T23986] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1546.128181][T23750] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1546.171564][T23750] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1546.215800][T23750] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1546.231340][T23750] XFS (loop1): SB validate failed with error -117. [ 1546.335771][ T2524] tipc: TX() has been purged, node left! [ 1546.341850][ T2524] tipc: TX() has been purged, node left! 17:58:17 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:17 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:17 executing program 5: r0 = socket$inet6(0xa, 0x0, 0xfffffffe) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) getsockname$inet6(r3, &(0x7f0000000000), &(0x7f00000000c0)=0x1c) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r4 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[@ANYRES64=r5], 0x8) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000100)=""/113, &(0x7f0000000200)=0x71) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:58:17 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000740000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1546.855963][T24105] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1546.891981][T24111] IPVS: ftp: loaded support on port[0] = 21 [ 1547.008287][T24107] XFS (loop1): SB sanity check failed [ 1547.019702][T24107] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1547.069832][T24107] XFS (loop1): Unmount and run xfs_repair [ 1547.143567][T24107] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:58:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1547.188157][T24107] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1547.245772][T24107] 00000010: 00 00 74 00 00 00 00 00 00 00 00 00 00 00 00 00 ..t............. [ 1547.328222][T24107] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1547.338405][T24107] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1547.348812][T24107] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1547.359571][T24107] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1547.374749][T24107] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1547.391547][T24107] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1547.425509][T24107] XFS (loop1): SB validate failed with error -117. [ 1547.540087][T24107] XFS (loop1): SB sanity check failed [ 1547.545756][T24107] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1547.572394][T24107] XFS (loop1): Unmount and run xfs_repair [ 1547.584136][T24107] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1547.594279][T24107] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1547.609441][T24107] 00000010: 00 00 74 00 00 00 00 00 00 00 00 00 00 00 00 00 ..t............. [ 1547.630205][T24107] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1547.643948][T24107] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1547.655728][T24107] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1547.664743][T24107] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1547.801327][T24107] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:18 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:18 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1547.895680][T24107] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1547.904688][T24107] XFS (loop1): SB validate failed with error -117. 17:58:18 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x4054) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4e8640, 0x42) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000380)={0x6cb5, 0x1f, 0x9, 0x19000, &(0x7f00000003c0)=""/102400, 0xb6, &(0x7f0000000200)=""/182, 0x7b, &(0x7f0000000100)=""/123}) sendfile(0xffffffffffffffff, r4, &(0x7f00000001c0)=0x8000000, 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x163002, 0x12) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:58:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000001800000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1548.289608][T24154] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:18 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1548.538552][T26324] XFS (loop1): SB sanity check failed [ 1548.544259][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1548.556459][T26324] XFS (loop1): Unmount and run xfs_repair [ 1548.562564][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1548.570502][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1548.587232][T26324] 00000010: 00 01 80 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1548.596567][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1548.606010][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1548.615372][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1548.624734][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1548.634026][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1548.643426][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1548.653354][T24211] XFS (loop1): SB validate failed with error -117. [ 1548.726073][T24147] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1548.736491][T24147] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1548.748165][T24147] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1548.773908][T24147] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1548.801097][T24272] IPVS: ftp: loaded support on port[0] = 21 17:58:19 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1548.921513][T24279] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010009896800000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:19 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:19 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') fchdir(0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1549.522095][T24396] XFS (loop1): SB sanity check failed [ 1549.530498][T24396] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1549.557245][T24411] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1549.567539][T24396] XFS (loop1): Unmount and run xfs_repair [ 1549.574554][T24396] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1549.585754][T24396] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1549.629883][T24396] 00000010: 98 96 80 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:20 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x21) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) listen(r2, 0x9) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1549.671058][T24396] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1549.746877][T24396] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1549.756299][T24396] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1549.765972][T24396] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1549.775094][T24396] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1549.827870][T24396] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1549.847504][T24396] XFS (loop1): SB validate failed with error -117. 17:58:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x0, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:20 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') fchdir(0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1550.173870][T24428] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010ffffff8c0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:20 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') fchdir(0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1550.643576][T24434] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1550.681735][ T27] audit: type=1804 audit(1585850301.166:125): pid=24444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1587/file0" dev="sda1" ino=16642 res=1 [ 1550.735872][T24435] XFS (loop1): SB sanity check failed [ 1550.744798][T24435] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1550.795672][T24435] XFS (loop1): Unmount and run xfs_repair [ 1550.807794][T24435] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1550.828656][ T27] audit: type=1804 audit(1585850301.206:126): pid=24444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1587/file0" dev="sda1" ino=16642 res=1 [ 1550.865675][ T27] audit: type=1804 audit(1585850301.266:127): pid=24444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1587/file0" dev="sda1" ino=16642 res=1 [ 1550.890482][ T27] audit: type=1804 audit(1585850301.306:128): pid=24444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1587/file0" dev="sda1" ino=16642 res=1 [ 1550.931619][T24435] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1550.992446][T24435] 00000010: ff ff 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1551.012447][T24435] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1551.021768][T24435] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1551.031068][T24435] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1551.040368][T24435] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1551.049629][T24435] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1551.058954][T24435] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1551.069226][T24435] XFS (loop1): SB validate failed with error -117. 17:58:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:21 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) 17:58:21 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x0, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:21 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:21 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f00000000c0)=0x1) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4a0000, 0x158) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1551.201562][T24435] XFS (loop1): SB sanity check failed [ 1551.208284][T24435] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1551.237181][T24435] XFS (loop1): Unmount and run xfs_repair [ 1551.256158][T24435] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1551.263779][T24435] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1551.275506][ T2524] tipc: TX() has been purged, node left! [ 1551.332738][T24569] IPVS: ftp: loaded support on port[0] = 21 [ 1551.364726][ T2524] tipc: TX() has been purged, node left! [ 1551.372255][ T2524] tipc: TX() has been purged, node left! [ 1551.426875][T24435] 00000010: ff ff 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1551.442965][T24435] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1551.464323][T24435] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1551.485528][T24435] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1551.512351][T24435] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1551.541884][T24435] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1551.581483][T24435] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1551.599262][T24435] XFS (loop1): SB validate failed with error -117. 17:58:22 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x0, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003a80000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:22 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) [ 1552.193673][T24788] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1552.290618][T24790] XFS (loop1): SB sanity check failed [ 1552.299186][T24790] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1552.324625][T24790] XFS (loop1): Unmount and run xfs_repair [ 1552.337485][T24790] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1552.362482][T24790] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1552.379706][T24790] 00000010: 00 03 a8 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1552.389718][T24790] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1552.399068][T24790] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1552.409184][T24790] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1552.442095][T24790] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1552.471588][T24790] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1552.519142][T24790] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1552.556681][T24790] XFS (loop1): SB validate failed with error -117. 17:58:23 executing program 5: r0 = socket$inet6(0xa, 0xa, 0x1000) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x800) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x4e23, @multicast1}}) shutdown(r3, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1552.750874][T24790] XFS (loop1): SB sanity check failed [ 1552.756413][T24790] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1552.772489][T24790] XFS (loop1): Unmount and run xfs_repair [ 1552.778615][T24790] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1552.786533][T24790] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1552.795435][T24790] 00000010: 00 03 a8 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1552.824427][T24790] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1552.834364][T24790] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1552.858598][T24790] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1552.876346][T24790] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1552.895565][T24790] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1552.915615][T24790] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1552.930979][T24790] XFS (loop1): SB validate failed with error -117. 17:58:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000b00000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:23 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:23 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) 17:58:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1553.388611][T24940] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1553.411510][T24931] XFS (loop1): SB sanity check failed [ 1553.426417][T24931] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:58:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1553.534328][T24931] XFS (loop1): Unmount and run xfs_repair [ 1553.572999][T24931] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:58:24 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1553.581532][T24931] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1553.590939][T24931] 00000010: 00 00 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1553.601445][T24931] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1553.613377][T24931] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1553.655549][T24931] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1553.675191][T24931] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1553.680605][T25048] IPVS: ftp: loaded support on port[0] = 21 [ 1553.734656][T24931] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1553.816525][T24931] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1553.885162][T24931] XFS (loop1): SB validate failed with error -117. 17:58:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000c00000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:24 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1554.284181][T24942] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:58:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100000edc00000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1554.449809][T24942] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1554.505920][T24942] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1554.553469][T24942] EXT4-fs: failed to create workqueue 17:58:25 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r4, @ANYBLOB="76000000e64c772ff3d61ac642b6a108c69349d4b005dab21dda9f6e7688b89d179a2f8b59e30d89278d1f419f1d2065eeb4634d16618eda264d4502f4cc9c9c5dea5b347af89000000000000000000a4aae8e8ccf4c942cd6e1abd23f05f0ef0b15ba8c62135b218b34347007b09ab532f508356ea5738fd331207bb65971a2fa661b4b9be46013d5bbeed70dfd3a1ba99903a62b4d4ab056bf63796386d8383b02063da9"], &(0x7f0000000140)=0x2) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r4, 0x80}, 0x8) r5 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r5, 0x1) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) 17:58:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1554.597940][T24942] EXT4-fs (loop0): mount failed [ 1554.813766][T25174] XFS (loop1): SB sanity check failed [ 1554.822758][T25174] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1554.845839][T25174] XFS (loop1): Unmount and run xfs_repair [ 1554.893747][T25174] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1554.930258][T25174] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:58:25 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1555.029645][T25174] 00000010: 00 ed c0 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1555.113589][T25174] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1555.215731][T25174] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1555.268018][T25174] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1555.335029][T25174] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:25 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1555.418174][T25174] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1555.464799][T25174] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1555.570938][T25174] XFS (loop1): SB validate failed with error -117. 17:58:26 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000c40000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:26 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$rxrpc(0x21, 0x2, 0x2) shutdown(r0, 0x1) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x2, 0x23) tkill(r4, 0xe) write$binfmt_elf64(r3, &(0x7f0000000300)=ANY=[@ANYRESOCT=r3, @ANYRESHEX, @ANYBLOB="6117a6c25e1ae672a7a43fa396398212690c6d34bca7a8fb69206fec527fb3d7e3aef277e635af550e582198e2548790b6b03d6714d02192429cc00a693e", @ANYRES16, @ANYRES64=r2, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r4, @ANYRES64, @ANYRESOCT=r3], @ANYBLOB="7f7709f0b1b979086af587951996a7d32ca5604d2af58eb9060a44aa793f8806a99bacdbf36d65f67bf06904726e1928adbb4dc5010906ddd790514264819c1365fc3bf0b16758b6ef6edc2d53f91ac5dd8468772f9581414179e64675ee391421f0eb22bf3f7bfd37fa077436e1949b471708a8f2d9222eb9e8524164603e3c4f6f95fbb62455c2850153c06ede6af8e763ad3c5e479a815956342ff0"], 0x116) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r5 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r5, 0x1) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, r6, &(0x7f00000001c0), 0xa19a) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) 17:58:26 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1556.231803][T25321] XFS (loop1): SB sanity check failed [ 1556.257026][T25332] IPVS: ftp: loaded support on port[0] = 21 [ 1556.285711][T25321] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1556.320435][T25336] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:26 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:27 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000000c0)={0x7, 0x10000, 0x3, {0x3, 0x401}, 0x6, 0x1ff}) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) bind$packet(0xffffffffffffffff, &(0x7f0000000000), 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@gettclass={0x24, 0x2a, 0x400, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xa, 0x4}, {0xf, 0x9}, {0xa, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1556.506046][T25321] XFS (loop1): Unmount and run xfs_repair [ 1556.521314][T25321] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1556.545844][T25321] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:58:27 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1556.627692][T25321] 00000010: 00 00 c4 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1556.705703][T25321] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1556.754845][T25346] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1556.796972][T25321] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1556.881959][T25321] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1556.960761][T25321] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1557.032098][T25321] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:27 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1557.095100][ T2524] tipc: TX() has been purged, node left! [ 1557.101230][T25321] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1557.112274][ T2524] tipc: TX() has been purged, node left! [ 1557.121224][T25321] XFS (loop1): SB validate failed with error -117. [ 1557.362877][T25465] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003c80000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1557.463914][T25350] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1557.476084][T25350] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1557.528604][T25350] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1557.597847][T25350] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 17:58:28 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) socket(0x27, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1557.779187][T25591] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1557.790464][T25583] XFS (loop1): SB sanity check failed [ 1557.805601][T25583] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1557.845867][T25583] XFS (loop1): Unmount and run xfs_repair [ 1557.851897][T25583] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1557.948193][T25583] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:58:28 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1557.995549][T25583] 00000010: 00 03 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1558.010305][T25597] IPVS: ftp: loaded support on port[0] = 21 17:58:28 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x80000) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r0, r2, r8, r1, r5], 0x5) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:58:28 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) socket(0x27, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1558.078581][T25583] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1558.132240][T25583] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1558.174412][T25583] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1558.260450][T25583] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1558.346286][T25583] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:28 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) socket(0x27, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1558.425520][T25583] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:29 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1558.512815][T25583] XFS (loop1): SB validate failed with error -117. [ 1558.713291][T25717] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003dc0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:29 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:29 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:29 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f00000000c0)={0x2}) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1559.644350][T26324] XFS (loop1): SB sanity check failed [ 1559.650245][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1559.703331][T25910] QAT: Invalid ioctl [ 1559.718611][T26324] XFS (loop1): Unmount and run xfs_repair [ 1559.734803][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1559.772412][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1559.800864][T26324] 00000010: 00 03 dc 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1559.832519][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1559.855579][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1559.877235][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1559.900013][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1559.922651][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1559.944454][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1559.977487][T25832] XFS (loop1): SB validate failed with error -117. [ 1560.085076][T25841] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:58:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1560.184009][T25832] XFS (loop1): SB sanity check failed [ 1560.189404][T25841] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1560.212496][T25832] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff 17:58:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:30 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1560.309845][T25841] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1560.343268][T25978] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1560.353529][T25832] XFS (loop1): Unmount and run xfs_repair [ 1560.368859][T25841] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1560.465052][T25981] IPVS: ftp: loaded support on port[0] = 21 [ 1560.495676][ T2524] tipc: TX() has been purged, node left! [ 1560.498025][T25832] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:58:31 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1560.586390][T25832] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1560.595294][T25832] 00000010: 00 03 dc 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:31 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1560.677901][T25957] QAT: Invalid ioctl [ 1560.694535][T25832] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1560.743915][T25832] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1560.783227][ T2524] tipc: TX() has been purged, node left! [ 1560.794509][T25832] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1560.825666][T25832] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1560.834620][T25832] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:31 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:58:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1560.886776][T25988] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1560.915656][T25832] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1560.930214][T25832] XFS (loop1): SB validate failed with error -117. 17:58:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003e60000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:31 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1561.566164][T26010] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1561.654905][T26011] XFS (loop1): SB sanity check failed [ 1561.675185][T26011] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1561.704283][T26011] XFS (loop1): Unmount and run xfs_repair [ 1561.751746][T25991] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1561.818410][T26011] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1561.914794][T26011] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1561.927167][T25991] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1561.967790][T26011] 00000010: 00 03 e6 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1562.002575][T25991] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:58:32 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1562.003737][T26011] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:58:32 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1562.068011][T25991] EXT4-fs: failed to create workqueue [ 1562.102747][T26011] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1562.112119][T25991] EXT4-fs (loop0): mount failed [ 1562.125728][T26011] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1562.134654][T26011] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:32 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e21, 0x800000, @loopback, 0x5}, 0x1c) shutdown(r1, 0x2) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0xfffffff, 0x4, 0xffff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a2d, 0x1, [], @p_u16=&(0x7f0000000000)=0x8000}}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) accept4$llc(r3, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x800) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = accept4(r4, 0x0, 0x0, 0x0) shutdown(r5, 0x1) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) 17:58:32 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1}, 0x18}}, 0x0) [ 1562.190726][T26034] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1562.277747][T26011] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:32 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1562.387559][T26011] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1562.401445][T26140] IPVS: ftp: loaded support on port[0] = 21 [ 1562.411734][T26011] XFS (loop1): SB validate failed with error -117. 17:58:32 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:32 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:58:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003ec0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1562.731063][T26156] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1563.073850][T26164] XFS (loop1): SB sanity check failed [ 1563.079489][T26164] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1563.135774][T26164] XFS (loop1): Unmount and run xfs_repair [ 1563.142979][T26164] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1563.255257][T26151] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1563.275685][T26151] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:58:33 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1563.303009][T26164] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:58:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)) [ 1563.375167][T26151] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1563.386736][T26164] 00000010: 00 03 ec 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1563.412992][T26151] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1563.528868][T26164] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1563.667814][T26164] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 17:58:34 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(0x0) [ 1563.712566][T26164] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1563.787610][T26164] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:34 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000000)) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:58:34 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1563.865089][T26164] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1563.879291][T26185] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1563.905596][T26164] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1563.914747][T26164] XFS (loop1): SB validate failed with error -117. [ 1563.951258][ T2524] tipc: TX() has been purged, node left! 17:58:34 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003ee0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1564.499101][T26310] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1564.608962][T26312] XFS (loop1): SB sanity check failed [ 1564.614647][T26312] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1564.635745][T26312] XFS (loop1): Unmount and run xfs_repair [ 1564.654180][T26312] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1564.718739][T26305] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1564.731105][T26312] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1564.757397][T26305] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1564.805252][T26305] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1564.841190][T26305] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1564.856220][T26312] 00000010: 00 03 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1564.964121][T26312] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:58:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1}, 0x18}}, 0x0) 17:58:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(0x0) 17:58:35 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:35 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r4, @ANYBLOB="76000000e64c772ff3d61ac642b6a108c69349d4b005dab21dda9f6e7688b89d179a2f8b59e30d89278d1f419f1d2065eeb4634d16618eda264d4502f4cc9c9c5dea5b347af89000000000000000000a4aae8e8ccf4c942cd6e1abd23f05f0ef0b15ba8c622d1bd7e9e491f2135b218b34347007b09ab532f508356ea5738fd331207bb65971a2fa661b4b9be46013d5bbeed70dfd3a1ba99903a62b4d4ab056bf63796386"], &(0x7f0000000140)=0x2) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000000c0)={r4, 0x7fffffff}, 0x8) shutdown(r3, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1565.091617][T26312] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1565.105516][T26312] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1565.130090][T26312] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1565.175750][T26312] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1565.176057][T26436] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1565.184735][T26312] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:35 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1565.252999][T26441] IPVS: ftp: loaded support on port[0] = 21 [ 1565.275578][T26312] XFS (loop1): SB validate failed with error -117. 17:58:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="000227bd7000ffdbdf250100f1ff62ff01007063690011000200303030303a30303a31302e30000000000e0001000dae0773657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f2002006e657464657673696d3000000800010070636900110002003030301101ce9f59a50ef7cdc19e6420f12ba29acb655a4159ecd5dbc8f2f24c406a88602f1356e60f24ee7da217547285a24dc14f74287a4897851a10a7b9330ada56bef6d0f74f7e2f4f31b4b7e320b7211bae229bdc93073e5bb18ab17c273badac1392581381fc78c5052ffc34d80690b16a13926235bca5e838c9b7cffd10cba30dfa97fa7fb283b5829efd591a79019e27f3f6ab63dbe6741bc10cb4d4212ede34ba945a529e7db785602fb27666b5ee584ecaf603412ffc33e18892"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(0x0) 17:58:35 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003f00000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1565.754682][T26561] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1565.926564][T26563] XFS (loop1): SB sanity check failed [ 1565.932901][T26563] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1565.945832][T26563] XFS (loop1): Unmount and run xfs_repair [ 1565.953973][T26563] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1566.047349][T26563] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:58:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000380)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000500)=':', 0x1}], 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) capget(&(0x7f0000000040)={0x19980330}, &(0x7f0000000300)={0x0, 0xa8e2, 0x0, 0x0, 0x4d7, 0x6}) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='\xef\x13\xd9\xce|c!\xcaWQ\xfa\x81\x0e\xdfQ\xd0N\xae)\x99', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 1566.136499][T26563] 00000010: 00 03 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1566.168112][T26563] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1566.235734][T26563] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1566.256060][T26563] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1566.265046][T26563] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1566.380945][T26563] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1566.399556][T26563] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:37 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:37 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="4640a4e905764ece4952c0dc6061e27c0d1219aaea5d7eb6fa8de2a961e0bb1c4809bb6ed9470b1251770d52cfa3b87918fcfd09512e00", 0x37, 0x800, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPSET_CMD_SAVE(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000008060300000000000000000081000008"], 0x14}}, 0x4040005) shutdown(r3, 0x1) r6 = open(&(0x7f0000000040)='./file1\x00', 0x131040, 0xa) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) [ 1566.445596][T26555] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1566.470966][T26563] XFS (loop1): SB validate failed with error -117. [ 1566.567905][T26555] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1566.637300][T26694] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1566.658091][T26555] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1566.674228][T26698] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 17:58:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010fffffff60000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1566.700519][T26555] EXT4-fs: failed to create workqueue [ 1566.717920][T26555] EXT4-fs (loop0): mount failed 17:58:37 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1}, 0x18}}, 0x0) [ 1567.001323][T26807] IPVS: ftp: loaded support on port[0] = 21 17:58:37 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:37 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x2) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:58:37 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:37 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x0) [ 1567.303219][T26909] XFS (loop1): SB sanity check failed [ 1567.312364][T26919] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1567.345628][T26909] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1567.379252][T26909] XFS (loop1): Unmount and run xfs_repair [ 1567.403793][T26909] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1567.411632][T26909] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1567.425681][T26909] 00000010: ff ff f6 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1567.442145][T26909] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1567.452455][T26909] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1567.461770][T26909] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1567.471001][T26909] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1567.480385][T26909] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1567.490525][T26909] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1567.509279][T26909] XFS (loop1): SB validate failed with error -117. 17:58:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="726877000000000000000000000000000000000000000000000000000000000008f8000003000000300300009802000000000000000000000000000000000000980200009802010400000000980200009802000003008000000000000000007e000000ffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000000000000000000f00d2d8303b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff0000000000000000000000000300000007000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000002b3abae23bbf4c570000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) 17:58:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000003f70000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:38 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1568.243009][T27031] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1568.265875][T27031] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1568.305616][T27031] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1568.324729][T27054] x_tables: ip_tables: CT target: only valid in raw table, not rhw [ 1568.351933][T27031] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1568.354270][T27058] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1568.396364][T27046] XFS (loop1): SB sanity check failed [ 1568.401997][T27046] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1568.417729][T27046] XFS (loop1): Unmount and run xfs_repair [ 1568.424031][T27046] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1568.441836][T27087] x_tables: ip_tables: CT target: only valid in raw table, not rhw [ 1568.565512][T27046] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1568.574517][T27046] 00000010: 00 03 f7 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1568.605730][T27046] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:58:39 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:39 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1568.676706][T27046] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1568.695583][T27046] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1568.734102][T27046] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1568.745319][T27046] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1568.765055][T27046] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:39 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101141, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/245) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2b3) [ 1568.795579][T27046] XFS (loop1): SB validate failed with error -117. [ 1568.825479][ T2524] tipc: TX() has been purged, node left! 17:58:39 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x8000b) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000000)=0x1) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1568.995562][ T2524] tipc: TX() has been purged, node left! [ 1569.110923][T27172] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1569.120925][T27172] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1569.131264][T27172] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1569.152465][T27172] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 17:58:39 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:39 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:39 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000001f80000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1569.368519][T27297] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1569.454946][T27301] IPVS: ftp: loaded support on port[0] = 21 17:58:40 executing program 3: clone(0x5b7a8cca550a211f, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1569.700316][T27361] XFS (loop1): SB sanity check failed [ 1569.711551][T27361] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1569.737210][T27361] XFS (loop1): Unmount and run xfs_repair [ 1569.752218][T27361] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1569.768740][T27361] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1569.798008][T27361] 00000010: 00 01 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1569.815868][T27361] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1569.832130][T27298] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1569.860208][T27361] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1569.978469][T27361] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1569.988133][T27298] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1570.065773][T27298] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1570.075953][T27361] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1570.145742][T27361] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1570.148318][T27298] EXT4-fs: failed to create workqueue [ 1570.204386][T27417] IPVS: ftp: loaded support on port[0] = 21 [ 1570.241067][T27361] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:40 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1570.284411][T27298] EXT4-fs (loop0): mount failed [ 1570.289569][T27361] XFS (loop1): SB validate failed with error -117. [ 1570.489013][T27429] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010fffffdf90000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:41 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1570.733054][T27417] IPVS: ftp: loaded support on port[0] = 21 17:58:41 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:41 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x4000) r0 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000017c0), 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)='/dev/vcs#\x00'}, 0x30) ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x2, 0x0, 0x7}, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}]) tkill(r0, 0x9) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x0, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0x1}]}) [ 1571.173168][T27536] XFS (loop1): SB sanity check failed [ 1571.178823][T27536] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1571.205300][T27536] XFS (loop1): Unmount and run xfs_repair [ 1571.217526][T27536] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1571.238779][T27536] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1571.260124][T27551] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1571.266076][T27548] IPVS: ftp: loaded support on port[0] = 21 [ 1571.317180][T27536] 00000010: ff fd f9 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1571.355290][T27536] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1571.366177][T27536] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1571.375409][T27536] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1571.392648][T27536] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1571.417604][T27536] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1571.436054][T27536] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:42 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001480)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1571.585554][T27536] XFS (loop1): SB validate failed with error -117. [ 1571.773107][T27562] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:42 executing program 3: [ 1571.852038][T27558] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:58:42 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000340)="6054707c53979a5e840f94c146", 0xd, 0x20040080, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x10, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000000)={0x6, 'geneve1\x00', {0x4}, 0x7}) socketpair(0x1d, 0x6, 0x8001, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(&(0x7f0000000140)='./file0/file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r0, &(0x7f00000002c0), 0x5) r5 = accept4(r4, 0x0, 0x0, 0x0) shutdown(r5, 0x1) r6 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESOCT=r5, @ANYRES16, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESDEC]], @ANYRES64=0x0, @ANYRES32, @ANYBLOB="e3ded22b882c5a3663247232d085ba6f69afb836edfe7558149ac8bd83577d017c820b5615cbe49e93", @ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES32, @ANYRES64], @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYRESOCT=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[]]], 0x7b) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) [ 1571.954744][T27536] XFS (loop1): SB sanity check failed [ 1571.960439][T27536] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1571.975806][T27536] XFS (loop1): Unmount and run xfs_repair [ 1572.010081][T27536] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1572.026673][T27558] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:58:42 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000000)=0x10, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = accept4(r4, 0x0, 0x0, 0x0) shutdown(r5, 0x1) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0xc0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) [ 1572.104884][T27536] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1572.132867][T27558] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1572.178741][T27558] EXT4-fs: failed to create workqueue [ 1572.205598][T27536] 00000010: ff fd f9 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1572.207772][T27558] EXT4-fs (loop0): mount failed [ 1572.214542][T27536] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:58:42 executing program 3: 17:58:42 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:42 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001480)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1572.375510][T27536] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1572.408662][T27536] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1572.462833][T27536] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1572.509991][T27536] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1572.544116][T27536] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1572.605666][T27536] XFS (loop1): SB validate failed with error -117. [ 1572.707004][T27692] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000ff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:43 executing program 3: [ 1572.985563][ T2524] tipc: TX() has been purged, node left! [ 1573.175558][ T2524] tipc: TX() has been purged, node left! [ 1573.241654][T27812] XFS (loop1): SB sanity check failed [ 1573.249891][T27812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1573.293146][T27812] XFS (loop1): Unmount and run xfs_repair [ 1573.307775][T27812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1573.325655][ T2524] tipc: TX() has been purged, node left! [ 1573.334420][T27812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1573.379296][T27700] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1573.391291][T27812] 00000010: 00 00 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1573.400844][T27812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1573.413008][T27812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1573.422383][T27812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1573.423433][T27700] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1573.434573][T27812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1573.460324][T27700] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1573.460362][T27812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1573.479102][ T2524] tipc: TX() has been purged, node left! [ 1573.482025][T27700] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 17:58:44 executing program 3: 17:58:44 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:44 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001480)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) accept4$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1573.625777][T27812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1573.634748][T27812] XFS (loop1): SB validate failed with error -117. [ 1573.645722][ T2524] tipc: TX() has been purged, node left! 17:58:44 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1573.675981][T27835] IPVS: ftp: loaded support on port[0] = 21 17:58:44 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:44 executing program 3: [ 1573.961225][T27812] XFS (loop1): SB sanity check failed [ 1573.966880][T27812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1573.991428][T27812] XFS (loop1): Unmount and run xfs_repair [ 1574.035808][T27812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1574.073640][T27812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1574.125865][T27812] 00000010: 00 00 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1574.166038][T27812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1574.206969][T27812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1574.245540][T27812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... 17:58:44 executing program 3: [ 1574.291305][T27812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1574.305988][T27812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1574.368183][T27947] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1574.378834][T27812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1574.388397][T27947] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:58:44 executing program 3: [ 1574.458903][T27947] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1574.487536][T27812] XFS (loop1): SB validate failed with error -117. 17:58:45 executing program 3: [ 1574.569130][T27947] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 17:58:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000000fff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:45 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:45 executing program 3: [ 1574.962886][T28072] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1575.137479][T26324] XFS (loop1): SB sanity check failed [ 1575.147912][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1575.161765][T26324] XFS (loop1): Unmount and run xfs_repair [ 1575.169048][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1575.178073][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1575.188617][T26324] 00000010: 00 0f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1575.199000][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1575.209308][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1575.220697][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1575.231163][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1575.241732][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1575.252325][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1575.262818][T28076] XFS (loop1): SB validate failed with error -117. [ 1575.380540][T28076] XFS (loop1): SB sanity check failed [ 1575.392843][T28076] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1575.416996][T28076] XFS (loop1): Unmount and run xfs_repair [ 1575.436101][T28076] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1575.465964][T28076] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1575.505842][T28076] 00000010: 00 0f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1575.521429][T28076] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1575.530732][T28076] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1575.539996][T28076] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1575.549196][T28076] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1575.562057][T28076] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1575.571408][T28076] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1575.580676][T28076] XFS (loop1): SB validate failed with error -117. 17:58:46 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e20, 0x6, @remote, 0x1000}, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffc}, 0x5, [0xfffffffb, 0x0, 0x1, 0x81, 0x5, 0x200, 0x7, 0x1]}, 0x5c) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$AUDIT_USER_AVC(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x453, 0x200, 0x70bd28, 0x25dfdbfd, "d164", ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) 17:58:46 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:46 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r3, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}}, 0x18}}, 0x0) 17:58:46 executing program 3: 17:58:46 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010fffffdff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:46 executing program 3: [ 1575.838403][T28205] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1575.921759][T28204] XFS (loop1): SB sanity check failed [ 1575.928143][T28204] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1575.940675][T28204] XFS (loop1): Unmount and run xfs_repair [ 1575.947217][T28204] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1575.955030][T28204] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1576.004255][T28204] 00000010: ff fd ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1576.060575][T28204] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1576.137610][T28204] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1576.179653][T28204] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1576.223528][T28204] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1576.245752][T28204] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1576.256770][T28211] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:58:46 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1576.267513][T28211] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1576.277854][T28211] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1576.303350][T28211] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1576.362959][T28229] IPVS: ftp: loaded support on port[0] = 21 [ 1576.395544][T28204] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1576.432836][T28204] XFS (loop1): SB validate failed with error -117. 17:58:47 executing program 3: 17:58:47 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(0x0) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1576.666031][T28238] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100001ffff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:47 executing program 3: [ 1577.246126][T28349] XFS (loop1): SB sanity check failed [ 1577.256548][T28349] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1577.276080][T28349] XFS (loop1): Unmount and run xfs_repair [ 1577.325674][T28349] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1577.385540][T28349] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:58:47 executing program 3: 17:58:47 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x440042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 1577.448181][T28349] 00000010: 01 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1577.488059][T28349] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1577.595549][T28349] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1577.641480][T28349] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1577.657868][T28349] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1577.705107][T28349] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1577.743963][T28349] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1577.806744][T28349] XFS (loop1): SB validate failed with error -117. 17:58:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r3, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}}, 0x18}}, 0x0) 17:58:48 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:48 executing program 3: 17:58:48 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(0x0) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1577.998052][T28349] XFS (loop1): SB sanity check failed [ 1578.007755][T28349] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1578.046646][T28349] XFS (loop1): Unmount and run xfs_repair [ 1578.054016][T28383] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1578.064701][T28349] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1578.075836][T28349] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1578.175659][T28349] 00000010: 01 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1578.299718][T28380] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1578.309785][T28380] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1578.320235][T28380] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1578.334508][T28349] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1578.353963][T28380] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1578.465501][T28349] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1578.474606][T28349] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... 17:58:49 executing program 3: [ 1578.595576][T28349] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1578.604664][T28349] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1578.615027][T28397] IPVS: ftp: loaded support on port[0] = 21 17:58:49 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(0x0) syz_open_procfs(0x0, 0x0) r0 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1578.665933][T28349] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:49 executing program 3: [ 1578.725568][T28349] XFS (loop1): SB validate failed with error -117. 17:58:49 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1578.859431][T28403] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010f9fdffff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:49 executing program 3: 17:58:49 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x141040, 0xa8) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1479c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000280)='./file0\x00', 0x141042, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r5, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x4c, 0x0, 0x300, 0x70bd26, 0x24dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x280c}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xfffffff7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1ff}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4048840}, 0x8000) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:58:49 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1579.282635][T21545] XFS (loop1): SB sanity check failed [ 1579.290627][T21545] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1579.342522][T21545] XFS (loop1): Unmount and run xfs_repair [ 1579.356286][T21545] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1579.378807][T21545] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 f9 XFSB............ [ 1579.403975][T21545] 00000010: fd ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1579.437814][T21545] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1579.472995][T21545] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1579.502362][T21545] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1579.518895][T21545] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1579.552089][T21545] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1579.568382][T21545] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1579.578401][T28508] XFS (loop1): SB validate failed with error -117. [ 1579.746365][ T27] audit: type=1804 audit(1585850330.236:129): pid=28634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1607/file0" dev="sda1" ino=16563 res=1 [ 1579.835234][ T27] audit: type=1804 audit(1585850330.316:130): pid=28630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir544872967/syzkaller.z074zO/1607/file0" dev="sda1" ino=16563 res=1 17:58:50 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r3, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}}, 0x18}}, 0x0) 17:58:50 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010fffdffff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) 17:58:50 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:50 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) socket$inet6_dccp(0xa, 0x6, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1580.481620][T28657] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1580.581646][T21545] XFS (loop1): SB sanity check failed [ 1580.592130][T21545] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1580.610986][T21545] XFS (loop1): Unmount and run xfs_repair [ 1580.617498][T21545] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1580.625204][T21545] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 ff XFSB............ [ 1580.635198][T21545] 00000010: fd ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1580.644851][T21545] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1580.654459][T21545] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1580.664030][T21545] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1580.673784][T21545] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1580.683503][T21545] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1580.695688][T21545] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1580.703130][T28672] IPVS: ftp: loaded support on port[0] = 21 [ 1580.710752][T28662] XFS (loop1): SB validate failed with error -117. [ 1580.866471][ T2524] tipc: TX() has been purged, node left! [ 1580.879087][ T2524] tipc: TX() has been purged, node left! [ 1580.909836][ T2524] tipc: TX() has been purged, node left! 17:58:51 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000107fffffff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:51 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x0, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1581.278030][T28797] XFS (loop1): SB sanity check failed [ 1581.283749][T28797] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1581.315729][T28797] XFS (loop1): Unmount and run xfs_repair [ 1581.321777][T28797] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1581.387274][T28797] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 7f XFSB............ [ 1581.397232][T28797] 00000010: ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1581.406743][T28797] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1581.419021][T28797] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1581.428432][T28797] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1581.439888][T28797] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1581.449861][T28797] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1581.462045][T28797] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1581.471664][T28797] XFS (loop1): SB validate failed with error -117. 17:58:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000108cffffff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1581.638897][T28911] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:52 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1581.799335][T28914] XFS (loop1): SB sanity check failed [ 1581.807154][T28914] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1581.832714][T28914] XFS (loop1): Unmount and run xfs_repair [ 1581.844321][T28914] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:58:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') preadv(r2, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 1581.880262][T28914] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 8c XFSB............ [ 1581.899774][T28914] 00000010: ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1581.915813][T28914] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1581.996879][T28914] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1582.085776][T28914] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1582.124117][T28914] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:52 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x0, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1582.158494][T28914] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1582.232305][T28924] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1582.242769][T28924] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1582.253317][T28924] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1582.265040][T28914] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1582.285865][T28924] EXT4-fs error (device loop0): ext4_fill_super:4532: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1582.300123][T28914] XFS (loop1): SB validate failed with error -117. [ 1582.307576][T28924] EXT4-fs (loop0): get root inode failed [ 1582.346824][T28932] IPVS: ftp: loaded support on port[0] = 21 [ 1582.349680][T28924] EXT4-fs (loop0): mount failed 17:58:52 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x204, 0x36, 0x300, 0x70bd27, 0x25dfdbfb, {0x1e}, [@nested={0x66, 0x14, 0x0, 0x1, [@generic="da8adc2ef9078a4a6345723a479172b4090fc41a47fd3854fbc4638ae64e8b542b0456d52dffe6d9a91e942767d6ade6d4b06022e4dc07694da36e8bf669d6471efa7eb6791a321e9f95", @typed={0x8, 0x65, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x3e, 0x0, 0x0, @uid}, @typed={0x8, 0x20, 0x0, 0x0, @uid}]}, @typed={0x8, 0x2a, 0x0, 0x0, @ipv4=@loopback}, @nested={0x1c, 0x12, 0x0, 0x1, [@typed={0x8, 0x1a, 0x0, 0x0, @uid=r6}, @typed={0x8, 0x3, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x91, 0x0, 0x0, @pid=r7}]}, @nested={0x5b, 0x3f, 0x0, 0x1, [@typed={0x9, 0x89, 0x0, 0x0, @str='$em1\x00'}, @typed={0x8, 0x3e, 0x0, 0x0, @u32=0x1400}, @generic="78c675e64d11db622baf98fe0df0c0ca7cfe8e18baa9a6e573069dc0f9033c1dee398a75f8deb9b60a91b386055a7774b74e863ecb", @generic="11909c5ff6457586e41da7774fe7"]}, @generic="e2ad7d01bf9e25a1d58121bbe343f60ee97ac19b12d13d44af6479f42d8d1aeebd88ffaf36ac11f33a1f68efb13772695e7b91fbb6892be17c3b497f30c51d0d72144fa05af8182395f0547436e3e4a0cdb4450d5e97f726f7a8b304a20a3efa58faaf900b3f6abd359e701fe956bd550915057df45e893a4868b5a3d8919295ac1f526ece267619f79acae1327909e72c988945310eb7ec61efd2b7d0e7a672001b1b0ad832d3746f18f08f349ca120a561b881776a0041f41de0799dd191f2be8649ec0509b74746184b5c234907d43ed4e49c6ba52b4ce3194280d11153cb034741c1d6bdf860a7279fe5f41b249d5f66", @typed={0x14, 0x63, 0x0, 0x0, @ipv6=@rand_addr="42b8de035f19abba25975b10a6f6c063"}]}, 0x204}, 0x1, 0x0, 0x0, 0x4810}, 0x80) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:58:53 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:58:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010f6ffffff0000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:53 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) 17:58:53 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x0, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1583.110903][T26324] XFS (loop1): SB sanity check failed [ 1583.116410][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1583.128947][T26324] XFS (loop1): Unmount and run xfs_repair [ 1583.134830][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1583.142778][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 f6 XFSB............ [ 1583.152139][T26324] 00000010: ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1583.161379][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1583.170583][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1583.179769][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1583.188970][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1583.198084][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1583.207329][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1583.216665][T29054] XFS (loop1): SB validate failed with error -117. 17:58:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1583.401010][T29067] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1583.424553][T29070] IPVS: ftp: loaded support on port[0] = 21 [ 1583.625880][T28995] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:58:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) listen(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 1583.735941][T28995] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:58:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000101a8a46775900000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1583.789554][T28995] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:58:54 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1583.866871][T28995] EXT4-fs: failed to create workqueue [ 1583.935598][T28995] EXT4-fs (loop0): mount failed [ 1584.059715][T29092] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1584.097113][T29087] XFS (loop1): SB sanity check failed 17:58:54 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1584.102710][T29087] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1584.114833][T29087] XFS (loop1): Unmount and run xfs_repair [ 1584.120829][T29087] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1584.128530][T29087] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 1a XFSB............ [ 1584.138070][T29087] 00000010: 8a 46 77 59 00 00 00 00 00 00 00 00 00 00 00 00 .FwY............ [ 1584.147504][T29087] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1584.168327][T29087] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1584.181741][T29087] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1584.199765][T29087] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:54 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x302, 0x104) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa19c) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x133) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e21, @remote}}) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) creat(&(0x7f0000000000)='./file0\x00', 0x100) [ 1584.210802][T29087] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1584.220229][T29087] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1584.245772][T29087] XFS (loop1): SB validate failed with error -117. 17:58:54 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x3) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000a00), &(0x7f0000000a40)=0x1c, 0x0) sendmsg$inet6(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000e40)={&(0x7f0000000e00)=[0x5, 0x0, 0x9, 0x0], 0x4, 0x0, 0x8, 0x0, 0x8, 0x0, 0x5, {0x1, 0x4, 0x8001, 0x0, 0x0, 0x8, 0x0, 0x8, 0xb2ee, 0x0, 0x0, 0x0, 0x0, 0x0, "8f07e1ce88c9d23e12365b7e8cef12a3f706061c0b37148cec7223f1d4176e8e"}}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) io_setup(0xffff, &(0x7f0000000ec0)) 17:58:54 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) 17:58:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010428f4c785900000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1584.745328][T29217] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:55 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = open(0x0, 0x0, 0x0) fchdir(r3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r4) [ 1585.080407][T26324] XFS (loop1): SB sanity check failed [ 1585.085951][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1585.108087][T26324] XFS (loop1): Unmount and run xfs_repair [ 1585.120622][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1585.142172][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 42 XFSB...........B [ 1585.165374][T26324] 00000010: 8f 4c 78 59 00 00 00 00 00 00 00 00 00 00 00 00 .LxY............ [ 1585.191043][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1585.225719][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 17:58:55 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1585.245605][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1585.257811][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1585.283727][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1585.304017][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:58:55 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffd}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = accept4(r3, 0x0, 0x0, 0x0) shutdown(r4, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1585.348759][T29325] XFS (loop1): SB validate failed with error -117. 17:58:55 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 17:58:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000002a00)) [ 1585.706809][T29462] IPVS: ftp: loaded support on port[0] = 21 17:58:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100a3969795900000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:56 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f0000000300)) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, 0x0}, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x273, 0x5, 0x0, {0x0, 0x0, 0x0, 0x80}}, 0x30) pipe2(&(0x7f00000004c0), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 17:58:56 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1586.337007][T26324] XFS (loop1): SB sanity check failed [ 1586.357760][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1586.401003][T26324] XFS (loop1): Unmount and run xfs_repair [ 1586.419904][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1586.438403][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 0a XFSB............ [ 1586.453276][T26324] 00000010: 39 69 79 59 00 00 00 00 00 00 00 00 00 00 00 00 9iyY............ [ 1586.467699][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1586.483201][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1586.497712][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1586.512207][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1586.527707][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1586.543208][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1586.566782][T29580] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1586.609205][T29570] XFS (loop1): SB validate failed with error -117. 17:58:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010d1b3c67a5900000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:57 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:57 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0xa, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x133) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000), 0x4) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x10, 0xc0000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRESOCT=r0, @ANYRES64, @ANYRES16, @ANYPTR64, @ANYRESDEC, @ANYRES64], 0x57) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000140), 0x0, &(0x7f0000000200)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70, 0x10}, 0x20000090) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1587.183489][T26324] XFS (loop1): SB sanity check failed [ 1587.189236][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1587.202305][T26324] XFS (loop1): Unmount and run xfs_repair [ 1587.208188][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1587.215729][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 d1 XFSB............ [ 1587.229617][T26324] 00000010: b3 c6 7a 59 00 00 00 00 00 00 00 00 00 00 00 00 ..zY............ [ 1587.242232][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1587.251462][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1587.260633][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1587.269611][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:58:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100bc5a27b5900000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1587.278702][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1587.287796][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1587.296891][T29703] XFS (loop1): SB validate failed with error -117. [ 1587.552648][T29725] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:58 executing program 3: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240), 0xc, &(0x7f0000000480)={0x0}}, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1587.636715][T29698] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1587.661816][T29698] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1587.702296][T29698] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1587.728085][T29698] EXT4-fs: failed to create workqueue [ 1587.744311][T29698] EXT4-fs (loop0): mount failed [ 1587.751427][T29727] XFS (loop1): SB sanity check failed [ 1587.761211][T29727] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1587.791252][T29727] XFS (loop1): Unmount and run xfs_repair [ 1587.806020][T29727] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1587.838740][T29727] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 0b XFSB............ [ 1587.910178][T29727] 00000010: c5 a2 7b 59 00 00 00 00 00 00 00 00 00 00 00 00 ..{Y............ [ 1587.992276][T29727] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1588.018915][T29727] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1588.043723][T29727] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... 17:58:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:58:58 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1588.104744][T29727] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1588.105550][ T43] tipc: TX() has been purged, node left! 17:58:58 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:58:58 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) read(r0, &(0x7f0000000100)=""/137, 0x89) [ 1588.179853][T29727] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:58:58 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000000c0)={0x2, 0x0, [{0x1, 0x6, 0x1, 0x6, 0x1, 0x1, 0x72}, {0xb, 0x7fffffff, 0x7, 0x400, 0x4, 0x5, 0x7}]}) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1588.249664][T29727] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1588.261278][T29856] IPVS: ftp: loaded support on port[0] = 21 [ 1588.305513][ T43] tipc: TX() has been purged, node left! [ 1588.345727][ T43] tipc: TX() has been purged, node left! [ 1588.352240][ T43] tipc: TX() has been purged, node left! [ 1588.358155][T29727] XFS (loop1): SB validate failed with error -117. [ 1588.434652][T29862] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:58:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="58465342000010000000000000001000000000c0ed000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:58:59 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1588.921235][T29975] XFS (loop1): SB sanity check failed [ 1588.927172][T29975] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1588.933128][T29851] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1588.947412][T29975] XFS (loop1): Unmount and run xfs_repair [ 1588.956558][T29975] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1588.987978][T29975] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1588.998309][T29975] 00000010: 00 00 00 c0 ed 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1589.023205][T29975] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1589.047478][T29975] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1589.057140][T29975] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1589.067353][T29975] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1589.083095][T29975] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1589.092866][T29975] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1589.102197][T29975] XFS (loop1): SB validate failed with error -117. [ 1589.139271][T29985] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1589.169424][T29851] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:58:59 executing program 3: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000024c0)='./file1\x00', 0x0) ioctl(r0, 0x6681, 0x0) [ 1589.375509][T29851] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1589.399456][T29851] EXT4-fs: failed to create workqueue [ 1589.429041][T29851] EXT4-fs (loop0): mount failed 17:59:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000010000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:59:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000140)=""/163, 0x100000345, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) sendmsg$IPVS_CMD_SET_SERVICE(r1, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:59:00 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:59:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, 0x0, &(0x7f00000002c0)) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r3, &(0x7f0000000900)={0x2c, 0xc}, 0x10) bind$xdp(r3, &(0x7f0000000900)={0x2c, 0x8, r2}, 0x10) [ 1590.257243][T17346] XFS (loop1): SB sanity check failed [ 1590.262767][T17346] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1590.287913][T17346] XFS (loop1): Unmount and run xfs_repair [ 1590.300721][T17346] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1590.315982][T17346] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1590.335084][T17346] 00000010: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 ................ [ 1590.354320][T17346] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1590.373256][T17346] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1590.392248][T17346] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1590.410109][T17346] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1590.429071][T17346] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1590.448075][T17346] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1590.466033][T30116] XFS (loop1): SB validate failed with error -117. [ 1590.528250][T30108] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1590.565768][T30108] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1590.586165][T30108] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1590.636439][T30108] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1590.691968][T30116] XFS (loop1): SB sanity check failed [ 1590.700505][T30116] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1590.736323][T30116] XFS (loop1): Unmount and run xfs_repair [ 1590.764906][T30116] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1590.785402][T30116] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1590.805717][T30116] 00000010: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 ................ [ 1590.814954][T30116] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1590.824047][T30116] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1590.833195][T30116] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1590.842284][T30116] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1590.851657][T30116] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1590.861104][T30116] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1590.870298][T30116] XFS (loop1): SB validate failed with error -117. 17:59:01 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e000002d443655a7e72ce1fbdf7c7c70f6b674324129031c1925c23da5755aed8d89f672febf51d37216b25f4d040045be64e40d3038bc86165f4f150fd66bf2d73a6ecf91ad06e337bebfcce5703cc03348b68735c4fa4a968991d1ceb2fe013100e3a61cd34ad071f6e8519cddf00d2d0138f6476766162cd363b6b9d0daeb621d8326f48225a32c75eec83a4f24e3a0cc30c2350c6a5ab20896f8065bb90e140f02be2daecdc239daa34b939310dfea488158e2c41a5c002eacfead929d75324974af833f75d5fa8d56f1d861f420f7b6f85dfc7138183f5b731e6d77393d744a6395e551472fee5d72297b04256995870e1850781e6c982bece0249af71c5fe16f6f9b35b2e4d7af1cb2e950eded825c09733aae7cdc90989bd8f99420f833eca336063d"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 17:59:01 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:59:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xac, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) 17:59:01 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x133) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x100, 0x70bd25, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4) shutdown(r3, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 17:59:01 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:59:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000040000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) [ 1591.200446][T30144] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1591.226758][T30148] IPVS: ftp: loaded support on port[0] = 21 [ 1591.602945][T30257] XFS (loop1): SB sanity check failed [ 1591.616479][T30257] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1591.658146][T30257] XFS (loop1): Unmount and run xfs_repair 17:59:02 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1591.719811][T30257] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1591.727753][T30257] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1591.736979][T30257] 00000010: 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 ................ [ 1591.746214][T30257] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1591.755285][T30257] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1591.816158][T30257] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1591.825086][T30257] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1591.895796][T30257] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1591.918403][T30257] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1591.984790][T30257] XFS (loop1): SB validate failed with error -117. 17:59:02 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f00000000c0)="4efb5eb6db28c3edf888fbfd63fcbdf084cda267c8dec96b5c46867aa135bb93dac0d6990814ee7c5c63e23679d533d4367fdee604e838863bff8f1d201db2a2b92b158fd791c13f1b680471564b104d73b574b1662b3fa24ddb420a1f6977f1776aa8817cef0723199572748b550a27645f272f647e", 0xfffffffffffffdc4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x10, 0x80800) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) 17:59:02 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1592.251859][ T43] tipc: TX() has been purged, node left! [ 1592.308168][T30257] XFS (loop1): SB sanity check failed [ 1592.315623][T30257] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1592.485941][T30257] XFS (loop1): Unmount and run xfs_repair [ 1592.609659][T30400] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1592.620008][T30400] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1592.626514][T30257] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1592.630746][T30400] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1592.674329][T30400] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 17:59:03 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x40) lremovexattr(&(0x7f0000001400)='./file0/file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="7472757357656489020acc8ae9202e76626f786e657430766d6e65743123"]) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x800010b, 0x18) connect$inet(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f00000013c0)=0x3, 0x4) sysfs$3(0x3) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x40001005}, 0x8) close(r1) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1}, 0x13000) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYBLOB="3b7fb06ac9652e2b3804dadb66bc6d9ed112c2cb937283d23984f3dfcfe4d8f9750699de5847dc00000000ca87bc24c44b8fb06b9dd6cf1184e24e433a7e8b5f081cb87e3afd834b87", @ANYRES16=r0, @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) [ 1592.776686][T30257] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1592.801124][T30257] 00000010: 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 ................ [ 1592.810116][T30257] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 17:59:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1592.833797][T30257] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1592.866979][T30257] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1592.902940][T30257] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:59:03 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1592.964742][T30257] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1593.014723][T30257] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1593.033253][T30524] IPVS: ftp: loaded support on port[0] = 21 [ 1593.053656][T30257] XFS (loop1): SB validate failed with error -117. 17:59:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000e0000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:59:03 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:59:03 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x40) lremovexattr(&(0x7f0000001400)='./file0/file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="7472757357656489020acc8ae9202e76626f786e657430766d6e65743123"]) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x800010b, 0x18) connect$inet(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f00000013c0)=0x3, 0x4) sysfs$3(0x3) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x40001005}, 0x8) close(r1) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1}, 0x13000) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYBLOB="3b7fb06ac9652e2b3804dadb66bc6d9ed112c2cb937283d23984f3dfcfe4d8f9750699de5847dc00000000ca87bc24c44b8fb06b9dd6cf1184e24e433a7e8b5f081cb87e3afd834b87", @ANYRES16=r0, @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) [ 1593.480000][T30532] XFS (loop1): SB sanity check failed [ 1593.486350][T30532] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1593.552000][T30532] XFS (loop1): Unmount and run xfs_repair [ 1593.577942][T30532] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:59:04 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x9b) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) accept4$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80c00) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x583880, 0x90) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept4(r5, 0x0, 0x0, 0x180000) shutdown(r6, 0x1) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r7, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r8, &(0x7f00000001c0), 0xa198) [ 1593.608112][T30532] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1593.688709][T30532] 00000010: 00 00 00 00 00 0e 00 00 00 00 00 00 00 00 00 00 ................ [ 1593.745725][T30532] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1593.749694][T30546] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1593.781719][T30532] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1593.830813][T30532] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1593.874956][T30532] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1593.937317][T30535] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1593.955896][T30535] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1594.022192][T30535] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1594.037728][T30532] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1594.081067][T30532] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1594.143168][T30532] XFS (loop1): SB validate failed with error -117. [ 1594.172230][T30535] EXT4-fs: failed to create workqueue [ 1594.213866][T30535] EXT4-fs (loop0): mount failed 17:59:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@remote}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 17:59:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000007e0000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:59:04 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:59:05 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1594.822220][T30675] XFS (loop1): SB sanity check failed [ 1594.830305][T30675] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1594.843926][T30689] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1594.857650][T30675] XFS (loop1): Unmount and run xfs_repair [ 1594.865961][T30675] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1594.904710][T30675] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1594.980680][T30675] 00000010: 00 00 00 00 00 7e 00 00 00 00 00 00 00 00 00 00 .....~.......... [ 1594.990722][T30675] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1595.002610][T30675] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1595.011734][T30675] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1595.023716][T30675] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1595.032736][T30675] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1595.185033][T30675] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:59:05 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x8, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:59:05 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f0000000000)=0x20) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1595.275523][T30675] XFS (loop1): SB validate failed with error -117. 17:59:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1595.534005][T30705] IPVS: ftp: loaded support on port[0] = 21 17:59:06 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1595.726959][T30709] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:59:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000100000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:59:06 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1596.217383][T26324] XFS (loop1): SB sanity check failed [ 1596.223153][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1596.235164][T26324] XFS (loop1): Unmount and run xfs_repair [ 1596.241069][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1596.252661][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1596.261671][T26324] 00000010: 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 ................ [ 1596.270630][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1596.279616][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1596.288624][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1596.297761][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1596.306727][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1596.315838][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1596.325112][T30818] XFS (loop1): SB validate failed with error -117. [ 1596.475700][T30828] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:59:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000200000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:59:07 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{^,md5sumproclo\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r4, 0x1000, 0xc8}, &(0x7f0000000200)={'enc=', 'raw', ' hash=', {'rmd160\x00'}}, &(0x7f0000000280)="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", &(0x7f0000001280)=""/200) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) [ 1596.741547][T30814] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1596.829485][T30814] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1596.843402][T30814] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1596.856101][T30814] EXT4-fs: failed to create workqueue [ 1596.861888][T30814] EXT4-fs (loop0): mount failed [ 1597.046818][T26324] XFS (loop1): SB sanity check failed [ 1597.052354][T26324] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1597.079962][T26324] XFS (loop1): Unmount and run xfs_repair [ 1597.092512][T26324] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1597.125403][T26324] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1597.155624][T26324] 00000010: 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 ................ [ 1597.165619][ T43] tipc: TX() has been purged, node left! [ 1597.171641][T26324] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1597.181636][T26324] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1597.190828][T26324] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1597.200702][T26324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1597.210307][T26324] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1597.220295][T26324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1597.229515][T30961] XFS (loop1): SB validate failed with error -117. [ 1597.326086][ T43] tipc: TX() has been purged, node left! [ 1597.373450][T17812] XFS (loop1): SB sanity check failed [ 1597.379005][T17812] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1597.391395][T17812] XFS (loop1): Unmount and run xfs_repair [ 1597.398551][T17812] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1597.426160][T17812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1597.459539][T17812] 00000010: 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 ................ [ 1597.469031][T17812] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1597.479149][T17812] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1597.488838][T17812] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1597.497977][ T43] tipc: TX() has been purged, node left! [ 1597.498570][T17812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1597.515137][T17812] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... 17:59:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000800)={{0x0, 0x0, @identifier="177b1ca807e8b320806d569eae78975b"}}) r2 = syz_genetlink_get_family_id$devlink(0x0) getresgid(&(0x7f0000000700), 0x0, &(0x7f0000000000)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYRES16=r2, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1648, 0x670) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0xffffa000) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) 17:59:08 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:59:08 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:59:08 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1597.524494][T17812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1597.595113][T30961] XFS (loop1): SB validate failed with error -117. [ 1597.653848][T30992] IPVS: ftp: loaded support on port[0] = 21 [ 1597.661616][T30990] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:59:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000300000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:59:08 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:59:08 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='\x00', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x6f, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0xa19a) r3 = accept4(r2, 0x0, 0x0, 0x80800) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=r6, @ANYBLOB="76000000e64c772ff3d61ac661b6a108c69349d4b005dab21dda9f6e7688b89d179a2f8b59e30d89278d1f419f1dec065b0c10c52065eeb4634d16618eda264d4502f4cc9c7500f6d3aa500520b6c4a2f5cded1b9c5dea5b347af89000000000000000000a4aae8e8ccf4c942cd6e3abd23f05f0ef0b15ba8c62135b218b34347007b09ab532f508356ea5738fd331207bb65971a2fa661b4b9be46013d5bbeed70dfd3a1ba99903a62b4d4ab056bf63796386d8383b02063da9"], &(0x7f0000000140)=0x2) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000000)={r6, 0x7}, 0x8) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r7, &(0x7f00000001c0), 0xa198) 17:59:08 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0xc0000, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:59:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000800)={{0x0, 0x0, @identifier="177b1ca807e8b320806d569eae78975b"}}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000780), &(0x7f0000000000)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYRES16=r2, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) pipe(&(0x7f00000000c0)) [ 1598.696345][T21545] XFS (loop1): SB sanity check failed [ 1598.701907][T21545] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1598.738869][T21545] XFS (loop1): Unmount and run xfs_repair [ 1598.752044][T21545] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1598.768532][T21545] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1598.793586][T21545] 00000010: 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 ................ [ 1598.855020][T21545] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1598.903488][T31242] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1598.970716][T21545] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1599.025503][T21545] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1599.034406][T21545] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1599.066350][T21545] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1599.075248][T21545] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1599.097484][T31221] XFS (loop1): SB validate failed with error -117. 17:59:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000400000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402", 0x67}, {&(0x7f0000000080)="8fb8525aac40b9f1653fc148168d25db97a314d7", 0x14, 0xcd}], 0x0, 0x0) 17:59:10 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0x0, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) 17:59:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8081, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000800)={{0x0, 0x0, @identifier="177b1ca807e8b320806d569eae78975b"}}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') getresgid(&(0x7f0000000700), &(0x7f0000000780), &(0x7f0000000000)) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYRES16=r2, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x4, 0x0, 0x0, 0x100000000}, 0x0) open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x139) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/1679, 0x68f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) pipe(&(0x7f00000000c0)) 17:59:10 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x2240, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x18100, 0x2, 0x2000002, 0x1, 0xfffffffffffffffd, 0x5, 0x8}, 0x0, 0x0, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x40) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x200, 0x0, 0x1, 0xdcb}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_INPUT2(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:59:10 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @remote, 0x8}, 0xa8) shutdown(r1, 0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = accept4(r2, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) [ 1599.733654][T31364] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 17:59:10 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, 0x0) r1 = socket(0x27, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890b, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8, 0x0, 0x200, 0x7fff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = open(0x0, 0x0, 0x0) fchdir(r4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="9d6d05d252b1f3dd16a392e622c7aa226d747deaeb5bc1c001d4c95626a2419b916d3f188244921500"/51, @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x40084) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x64, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r5) [ 1600.073934][T29257] XFS (loop1): SB sanity check failed [ 1600.079542][T29257] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x25b/0x2c0, xfs_sb block 0xffffffffffffffff [ 1600.110673][T29257] XFS (loop1): Unmount and run xfs_repair [ 1600.147738][T29257] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 1600.176241][T29257] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1600.198437][T29257] 00000010: 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 ................ [ 1600.215014][T31492] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 1600.225499][T29257] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 1600.235570][T29257] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 1600.320159][T29257] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 1600.368314][ C1] ================================================================== [ 1600.376466][ C1] BUG: KCSAN: data-race in blk_mq_run_hw_queue / blk_mq_sched_insert_request [ 1600.385214][ C1] [ 1600.387363][T29257] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1600.387552][ C1] write to 0xffff888129c78810 of 8 bytes by task 2517 on cpu 0: [ 1600.387581][ C1] blk_mq_sched_insert_request+0x2f2/0x3e0 [ 1600.409921][ C1] blk_mq_requeue_work+0x347/0x440 [ 1600.415044][ C1] process_one_work+0x424/0x930 [ 1600.419912][ C1] worker_thread+0x9a/0x7e0 [ 1600.424423][ C1] kthread+0x1cb/0x1f0 [ 1600.428506][ C1] ret_from_fork+0x1f/0x30 [ 1600.432905][ C1] [ 1600.435230][ C1] read to 0xffff888129c78810 of 8 bytes by interrupt on cpu 1: [ 1600.442778][ C1] blk_mq_run_hw_queue+0x10a/0x1b0 [ 1600.447898][ C1] blk_mq_run_hw_queues+0xa2/0xe0 [ 1600.452930][ C1] scsi_end_request+0x338/0x350 [ 1600.455203][T29257] 00000060: 00 00 03 5a b4 24 02 00 00 00 00 00 00 00 00 00 ...Z.$.......... [ 1600.457779][ C1] scsi_io_completion+0x11e/0xcc0 [ 1600.457795][ C1] scsi_finish_command+0x283/0x390 [ 1600.457813][ C1] scsi_softirq_done+0x249/0x270 [ 1600.457828][ C1] blk_done_softirq+0x1e6/0x250 [ 1600.457844][ C1] __do_softirq+0x118/0x34a [ 1600.457857][ C1] irq_exit+0xb5/0xd0 [ 1600.457880][ C1] do_IRQ+0x7b/0x120 [ 1600.498893][ C1] ret_from_intr+0x0/0x21 [ 1600.503226][ C1] inet_twsk_purge+0x30b/0x3a0 [ 1600.507995][ C1] dccp_v4_exit_batch+0x1f/0x30 [ 1600.512852][ C1] ops_exit_list.isra.0+0x9e/0xb0 [ 1600.517878][ C1] cleanup_net+0x40a/0x6a0 [ 1600.521245][T29257] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1600.522385][ C1] process_one_work+0x424/0x930 [ 1600.522410][ C1] worker_thread+0x9a/0x7e0 [ 1600.540570][ C1] kthread+0x1cb/0x1f0 [ 1600.544640][ C1] ret_from_fork+0x1f/0x30 [ 1600.549043][ C1] [ 1600.551389][ C1] Reported by Kernel Concurrency Sanitizer on: [ 1600.557542][ C1] CPU: 1 PID: 43 Comm: kworker/u4:2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1600.565770][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1600.575843][ C1] Workqueue: netns cleanup_net [ 1600.580622][ C1] ================================================================== [ 1600.588695][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 1600.595291][ C1] CPU: 1 PID: 43 Comm: kworker/u4:2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1600.603526][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1600.613600][ C1] Workqueue: netns cleanup_net [ 1600.618366][ C1] Call Trace: [ 1600.621649][ C1] [ 1600.624527][ C1] dump_stack+0x11d/0x187 [ 1600.628871][ C1] panic+0x210/0x640 [ 1600.632783][ C1] ? vprintk_func+0x89/0x13a [ 1600.637390][ C1] kcsan_report.cold+0xc/0xf [ 1600.641997][ C1] kcsan_setup_watchpoint+0x3fb/0x440 [ 1600.647375][ C1] blk_mq_run_hw_queue+0x10a/0x1b0 [ 1600.652498][ C1] blk_mq_run_hw_queues+0xa2/0xe0 [ 1600.657534][ C1] scsi_end_request+0x338/0x350 [ 1600.662402][ C1] scsi_io_completion+0x11e/0xcc0 [ 1600.667443][ C1] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1600.669903][T31477] XFS (loop1): SB validate failed with error -117. [ 1600.673365][ C1] scsi_finish_command+0x283/0x390 [ 1600.684988][ C1] scsi_softirq_done+0x249/0x270 [ 1600.689943][ C1] blk_done_softirq+0x1e6/0x250 [ 1600.694923][ C1] __do_softirq+0x118/0x34a [ 1600.699451][ C1] irq_exit+0xb5/0xd0 [ 1600.703437][ C1] do_IRQ+0x7b/0x120 [ 1600.707342][ C1] common_interrupt+0xf/0xf [ 1600.711974][ C1] [ 1600.714926][ C1] RIP: 0010:inet_twsk_purge+0x30b/0x3a0 [ 1600.720492][ C1] Code: ff e8 f9 7c 51 fd e8 34 55 46 fd 48 8b 7c 24 30 83 44 24 24 01 44 8b 7c 24 24 e8 10 6a 5f fd 48 8b 44 24 28 44 89 fe 8b 68 10 <89> ef e8 be 7d 51 fd 44 39 fd 0f 83 28 fd ff ff e8 c0 7c 51 fd e8 [ 1600.740102][ C1] RSP: 0000:ffffc90000dc7cd8 EFLAGS: 00000202 ORIG_RAX: ffffffffffffffdd [ 1600.748519][ C1] RAX: ffffffff86f18000 RBX: 0000000000000002 RCX: ffffffff86d9e578 [ 1600.756498][ C1] RDX: 0000000000000000 RSI: 0000000000078db6 RDI: ffffffff86f18010 [ 1600.764483][ C1] RBP: 000000000007ffff R08: 0000000000000000 R09: 0000ffff86f18010 [ 1600.772468][ C1] R10: 000088812b0a6378 R11: 0000ffff86f18013 R12: 0000000000000001 [ 1600.780572][ C1] R13: ffffc90000dc7d98 R14: 0000000000078db5 R15: 0000000000078db6 [ 1600.788590][ C1] ? inet_twsk_purge+0x300/0x3a0 [ 1600.793549][ C1] ? ip_queue_xmit+0x50/0x50 [ 1600.798155][ C1] ? dccp_v4_exit_batch+0x30/0x30 [ 1600.803183][ C1] dccp_v4_exit_batch+0x1f/0x30 [ 1600.808114][ C1] ops_exit_list.isra.0+0x9e/0xb0 [ 1600.813297][ C1] cleanup_net+0x40a/0x6a0 [ 1600.817739][ C1] process_one_work+0x424/0x930 [ 1600.822616][ C1] worker_thread+0x9a/0x7e0 [ 1600.827137][ C1] ? rescuer_thread+0x6a0/0x6a0 [ 1600.831988][ C1] kthread+0x1cb/0x1f0 [ 1600.836055][ C1] ? kthread_unpark+0xd0/0xd0 [ 1600.840747][ C1] ret_from_fork+0x1f/0x30 [ 1600.846949][ C1] Kernel Offset: disabled [ 1600.851468][ C1] Rebooting in 86400 seconds..