9e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 413.650645] bond0: Enslaving lo as an active interface with an up link 09:47:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x930000000000}]) [ 413.738071] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 413.786780] XFS (loop5): Mounting V4 Filesystem [ 413.820388] attempt to access beyond end of device [ 413.850399] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 413.872739] loop5: rw=4096, want=2036888240641, limit=264192 [ 413.915138] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 413.985584] XFS (loop5): empty log check failed 09:47:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 414.018641] XFS (loop5): log mount/recovery failed: error -5 [ 414.080805] XFS (loop5): log mount failed 09:47:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x7300}]) 09:47:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 414.337828] device lo entered promiscuous mode [ 414.353852] device tunl0 entered promiscuous mode [ 414.398520] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x705000}]) [ 414.462994] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 414.489116] XFS (loop5): Mounting V4 Filesystem [ 414.530958] attempt to access beyond end of device [ 414.566308] loop5: rw=4096, want=2036888240641, limit=264192 [ 414.574255] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:47:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 414.640401] XFS (loop5): empty log check failed [ 414.655287] XFS (loop5): log mount/recovery failed: error -5 09:47:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 414.725598] XFS (loop5): log mount failed 09:47:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x3000000}]) 09:47:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 415.077483] XFS (loop5): Mounting V4 Filesystem 09:47:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x400000000000}]) [ 415.115161] attempt to access beyond end of device [ 415.134977] loop5: rw=4096, want=2036888240641, limit=264192 [ 415.159625] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 415.252416] XFS (loop5): empty log check failed [ 415.457033] XFS (loop5): log mount/recovery failed: error -5 09:47:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 415.611585] XFS (loop5): log mount failed 09:47:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x8000000000000000}]) 09:47:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 415.933021] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 415.944148] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 415.952965] net_ratelimit: 14 callbacks suppressed [ 415.952974] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 09:47:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x400000000000000}]) [ 416.377767] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 416.388069] XFS (loop5): Mounting V4 Filesystem [ 416.395965] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0xffefffffff7f0000}]) [ 416.426545] attempt to access beyond end of device [ 416.431592] loop5: rw=4096, want=2036888240641, limit=264192 [ 416.453493] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 416.479018] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 416.493321] XFS (loop5): empty log check failed [ 416.513728] XFS (loop5): log mount/recovery failed: error -5 [ 416.521482] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 416.537901] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 416.549212] XFS (loop5): log mount failed [ 416.564993] bond0: lo ether type (772) is different from other slaves (1), can not enslave it 09:47:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 416.577187] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 09:47:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x4000}]) [ 416.696932] device lo left promiscuous mode [ 416.715665] device tunl0 left promiscuous mode [ 416.732835] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 416.783489] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 416.822502] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 416.844119] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 416.855532] XFS (loop5): Mounting V4 Filesystem [ 416.871632] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 416.892665] attempt to access beyond end of device [ 416.901087] loop5: rw=4096, want=2036888240641, limit=264192 [ 416.907968] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 416.917886] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 416.958723] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 416.984721] XFS (loop5): empty log check failed 09:47:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1c0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 417.011911] XFS (loop5): log mount/recovery failed: error -5 09:47:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x2}]) [ 417.077118] XFS (loop5): log mount failed [ 417.121255] device lo entered promiscuous mode [ 417.147236] device tunl0 entered promiscuous mode [ 417.166975] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 417.196909] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 417.280849] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 417.316473] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x930000}]) [ 417.374112] XFS (loop5): Mounting V4 Filesystem [ 417.403907] attempt to access beyond end of device [ 417.425937] loop5: rw=4096, want=2036888240641, limit=264192 [ 417.433885] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 417.458875] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 09:47:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 417.481509] XFS (loop5): empty log check failed [ 417.513242] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 417.529653] XFS (loop5): log mount/recovery failed: error -5 09:47:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x400000}]) [ 417.557123] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 417.582578] XFS (loop5): log mount failed 09:47:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 417.651352] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 417.713208] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:43 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff00000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x200000000000000}]) [ 417.893254] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 417.925281] XFS (loop5): Invalid superblock magic number [ 417.931766] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 417.952558] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 417.970281] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:43 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc001}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 418.106279] device lo left promiscuous mode 09:47:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0xff600000}]) [ 418.158846] device tunl0 left promiscuous mode [ 418.200547] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 418.241544] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 418.268729] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 418.288732] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 418.299960] XFS (loop5): Invalid superblock magic number 09:47:43 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0xf07000}]) 09:47:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 418.501195] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 418.512648] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 418.520894] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 418.547348] bond0: lo ether type (772) is different from other slaves (1), can not enslave it 09:47:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x100000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:44 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x9300}]) [ 418.646615] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 418.660767] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x200000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 418.738212] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 418.769497] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 418.794729] XFS (loop5): Invalid superblock magic number 09:47:44 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 418.826347] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 418.865170] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0xffffffffff600000}]) [ 418.949115] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 418.983591] bond0: lo ether type (772) is different from other slaves (1), can not enslave it 09:47:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:44 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 419.133683] XFS (loop5): Invalid superblock magic number [ 419.148011] device lo entered promiscuous mode [ 419.201324] device tunl0 entered promiscuous mode 09:47:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x70f000}]) [ 419.224833] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 419.294249] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 419.340211] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 419.373430] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:44 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x2}]) [ 419.516380] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 419.538192] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 419.560049] device lo left promiscuous mode [ 419.570097] device tunl0 left promiscuous mode [ 419.582165] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 419.599322] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 419.613723] XFS (loop5): Invalid superblock magic number 09:47:45 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x3}]) [ 419.725363] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 09:47:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 419.826739] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 419.870431] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 419.909282] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:45 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x60700000000000}]) [ 419.994846] XFS (loop5): Invalid superblock magic number [ 420.016082] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 420.118466] bond0: lo ether type (772) is different from other slaves (1), can not enslave it 09:47:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x7300}]) [ 420.381892] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 420.431760] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 420.455139] device lo entered promiscuous mode [ 420.473467] device tunl0 entered promiscuous mode 09:47:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 420.488030] XFS (loop5): Invalid superblock magic number [ 420.516689] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x706000}]) [ 420.566816] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 420.602182] bond0: lo ether type (772) is different from other slaves (1), can not enslave it 09:47:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 420.663065] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc0010000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 420.815793] device lo left promiscuous mode [ 420.837720] device tunl0 left promiscuous mode [ 420.846056] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 420.894573] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 420.907251] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 420.911537] XFS (loop5): Invalid superblock magic number [ 420.928526] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x730000}]) 09:47:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 421.178280] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 421.222900] XFS (loop5): Invalid superblock magic number [ 421.228607] net_ratelimit: 34 callbacks suppressed [ 421.228617] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x300000000000000}]) 09:47:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000", 0x3f}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 421.295994] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 421.305630] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 421.465702] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 421.475331] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 421.499585] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 421.509732] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 421.536202] XFS (loop5): device supports 512 byte sectors (not 0) 09:47:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x100000000000000}]) 09:47:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000", 0x3f}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 421.899695] device lo entered promiscuous mode 09:47:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 421.949757] device tunl0 entered promiscuous mode [ 421.964381] bond0: tunl0 is up - this may be due to an out of date ifenslave 09:47:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 421.997689] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 422.050382] bond0: tunl0 is up - this may be due to an out of date ifenslave [ 422.059921] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 422.075429] XFS (loop5): device supports 512 byte sectors (not 0) 09:47:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x400000000000}]) [ 422.104800] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 422.145023] bond0: lo ether type (772) is different from other slaves (1), can not enslave it 09:47:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000", 0x3f}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 422.181545] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 09:47:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 422.289013] device lo left promiscuous mode [ 422.304100] device tunl0 left promiscuous mode [ 422.332934] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 422.371440] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 422.391941] XFS (loop5): device supports 512 byte sectors (not 0) 09:47:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x4000}]) [ 422.433644] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 422.495385] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 422.546527] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b480000400000000000000080000000000000008100000000000000820000000700001000000000010000", 0x5e}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:47:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x507000}]) [ 422.683941] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:47:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 422.763888] device lo entered promiscuous mode [ 422.769001] device tunl0 entered promiscuous mode [ 422.776350] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 422.778096] XFS (loop5): device supports 512 byte sectors (not 0) [ 422.786469] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 422.865055] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b480000400000000000000080000000000000008100000000000000820000000700001000000000010000", 0x5e}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 422.986431] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:47:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) 09:47:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0xffffffffff600000}]) 09:47:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 423.111604] device lo left promiscuous mode [ 423.119793] device tunl0 left promiscuous mode [ 423.132229] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 423.147105] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 423.151210] XFS (loop5): device supports 512 byte sectors (not 0) 09:47:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) 09:47:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b480000400000000000000080000000000000008100000000000000820000000700001000000000010000", 0x5e}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 423.334515] device lo entered promiscuous mode 09:47:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) [ 423.369548] device tunl0 entered promiscuous mode 09:47:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x200000000000000}]) [ 423.438662] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 423.536625] XFS (loop5): device supports 512 byte sectors (not 0) [ 423.561697] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000", 0x6e}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x400000000000000}]) 09:47:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 423.893440] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 423.936809] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 423.961107] XFS (loop5): SB sanity check failed [ 423.966220] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 09:47:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x2000000}]) [ 424.045957] XFS (loop5): Unmount and run xfs_repair [ 424.066674] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 424.091087] 00000000bf3846fc: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 424.101600] 000000008ee00cd3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 424.119812] 000000009a8a12b3: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 424.129078] 00000000e9dfc56e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 424.143620] 00000000aca36ffe: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 424.158853] 0000000036d7eaeb: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 09:47:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc001000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 424.171530] 00000000d2ae8acc: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 424.183872] 000000008fcd3aff: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 424.193309] XFS (loop5): SB validate failed with error -117. [ 424.241601] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x3000000}]) 09:47:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000", 0x6e}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 424.308222] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffff000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 424.528398] device lo left promiscuous mode [ 424.550962] XFS (loop5): SB sanity check failed 09:47:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x400000}]) [ 424.597636] device tunl0 left promiscuous mode [ 424.610952] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 424.630452] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 424.677790] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 424.701741] XFS (loop5): Unmount and run xfs_repair [ 424.707007] XFS (loop5): First 128 bytes of corrupted metadata buffer: 09:47:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 424.723062] 000000006245ebf9: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 424.747827] 000000009d95ce45: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 424.767464] 00000000f17c0275: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 424.827973] 000000005d70370a: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 424.850172] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 424.859635] 00000000d93c0633: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 09:47:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x930000}]) [ 424.882143] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 424.911452] 000000007c1f3aff: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 09:47:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 424.972367] 00000000b8b914c6: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 424.993239] 00000000e48d9ad4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 425.038568] XFS (loop5): SB validate failed with error -117. [ 425.091060] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000", 0x6e}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 425.175629] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x70500000000000}]) 09:47:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 425.388246] XFS (loop5): SB sanity check failed [ 425.424868] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 425.442568] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 425.452578] XFS (loop5): Unmount and run xfs_repair [ 425.457955] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 425.462157] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 425.467064] 00000000228579ab: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 425.483179] 000000007e5cbf3a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 425.492483] 00000000c7d088ae: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 425.502782] 00000000ea05623e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 425.512431] 000000004b3ba2d8: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 09:47:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 425.554630] 00000000e0c2d905: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 425.592487] 00000000d7e27cd4: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 09:47:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0xf0700000000000}]) [ 425.625969] 00000000824ec1c6: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 425.666469] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 425.683215] XFS (loop5): SB validate failed with error -117. [ 425.735974] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:51 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000000000000000000000", 0x76}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x730000000000}]) 09:47:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 425.934434] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 425.978685] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 425.989597] XFS (loop5): SB sanity check failed [ 425.994461] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 426.023202] XFS (loop5): Unmount and run xfs_repair [ 426.053857] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 426.087084] 00000000d9d33c1a: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 09:47:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc001000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 426.130884] 00000000d3b1e501: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 426.181063] 00000000c8331ef7: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 426.200776] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 426.261965] 000000009b50ec9c: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 426.291326] net_ratelimit: 21 callbacks suppressed [ 426.291340] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 426.341239] 00000000e307b618: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 426.373273] 00000000f43e526f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 09:47:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x705000}]) [ 426.394600] 00000000abeacb9c: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 426.410926] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 426.450262] 0000000028dadf08: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 426.478957] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 426.502656] XFS (loop5): SB validate failed with error -117. 09:47:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000000000000000000000", 0x76}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0xf07000}]) [ 426.652321] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 426.666463] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 426.719695] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 426.783229] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 426.920334] XFS (loop5): SB sanity check failed [ 426.925215] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 09:47:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x9300}]) [ 426.994658] XFS (loop5): Unmount and run xfs_repair [ 427.029369] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 427.055048] 00000000037bfb13: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 427.074937] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 427.117642] 000000001da02abb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 427.135531] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 427.169980] 0000000090879626: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 427.188889] 0000000023316295: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 427.226452] 0000000044f360a6: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 427.241450] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x7fffffffefff}]) [ 427.289821] 0000000097597b8f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 427.312294] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 427.368793] 00000000e80ba40e: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 427.405134] 0000000013a708e9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:47:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 427.463521] XFS (loop5): SB validate failed with error -117. 09:47:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000000000000000000000", 0x76}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x300}]) [ 427.679736] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 427.748941] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 427.834806] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 427.900173] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 427.989127] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 428.028161] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 428.042945] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 428.072616] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 428.083671] XFS (loop5): SB sanity check failed 09:47:53 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x1000000}]) [ 428.088833] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 428.108890] XFS (loop5): Unmount and run xfs_repair [ 428.117949] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 428.155433] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 428.167163] 00000000c6c20864: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 428.199953] 00000000db4de442: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 428.210959] 0000000052f5223a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 428.222600] 0000000097dfcc8d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 428.231950] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 428.245515] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 428.255650] 000000003b212540: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 428.265460] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 428.265470] 0000000009ff1256: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 428.265487] 000000006f7fdae9: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 09:47:53 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x8000000000000000}]) [ 428.429870] 000000005b036e54: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 428.513258] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 428.528652] XFS (loop5): SB validate failed with error -117. 09:47:54 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 428.577705] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 428.603226] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:54 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 428.629327] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0xffefffffff7f0000}]) [ 428.762327] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:54 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 428.824574] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 428.852907] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 428.871817] XFS (loop5): SB sanity check failed [ 428.874260] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 428.878851] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 428.897239] XFS (loop5): Unmount and run xfs_repair [ 428.902685] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 428.909847] 0000000031c4878d: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 09:47:54 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x60ff}]) [ 428.919107] 00000000a4dc61d5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 428.928372] 00000000c110a069: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 428.938503] 00000000d24ab762: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 428.958378] 000000003ab40606: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 09:47:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 428.995872] 00000000fa90ce6d: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 09:47:54 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 429.048019] 00000000bd5d1544: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 429.085497] 00000000db83d724: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 09:47:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 429.128742] XFS (loop5): SB validate failed with error -117. [ 429.149237] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 429.176053] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x607000}]) [ 429.224954] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 429.377443] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 429.473708] XFS (loop5): SB sanity check failed [ 429.478918] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 429.498201] XFS (loop5): Unmount and run xfs_repair [ 429.503374] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 429.510257] 000000006a7d57c6: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 429.520212] 00000000d7414e9b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 429.530547] 0000000000743e2f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 429.539626] 000000001a6ef3fe: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 429.553315] 000000008b3039d9: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 09:47:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x70f000}]) [ 429.568446] 000000007d696cc9: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 429.584181] 00000000791e18d7: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 429.597657] 00000000879ca28d: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 429.607733] XFS (loop5): SB validate failed with error -117. 09:47:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 429.667823] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 429.728747] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x930000000000}]) 09:47:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 429.867114] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 429.882588] XFS (loop5): SB sanity check failed [ 429.887326] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 09:47:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 429.940556] XFS (loop5): Unmount and run xfs_repair [ 429.950175] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 429.959430] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 429.967468] 00000000b361e468: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 429.976553] 0000000037c91b78: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 430.036042] 000000005a42c82c: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 430.065886] 0000000089ad7ee2: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 430.086647] 00000000ec206283: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 430.097545] 00000000e9dbe2b7: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 430.106407] 0000000026ecc4e3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 430.123223] 00000000baed66f9: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 430.132551] XFS (loop5): SB validate failed with error -117. 09:47:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0xff600000}]) [ 430.208506] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c090804", 0x7c}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 430.254947] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 430.277535] bond0: lo ether type (772) is different from other slaves (1), can not enslave it 09:47:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 430.299121] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:47:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x7fcda9bbc000}]) [ 430.420447] XFS (loop5): SB sanity check failed [ 430.463795] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 430.509806] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 430.536219] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 430.548513] XFS (loop5): Unmount and run xfs_repair 09:47:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 430.570663] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 430.602819] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 430.620646] 000000006ab63210: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 09:47:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 430.687633] 000000006bfe4c83: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 430.782158] 00000000c709aaa1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 430.824849] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 430.835953] 00000000b2e8c0fd: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 430.871717] 00000000904ccb15: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 430.908512] 0000000005bf7306: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 430.923262] 00000000d1eec6ca: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 430.947028] 00000000aa3693e9: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 430.956089] XFS (loop5): SB validate failed with error -117. 09:47:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0xc0bba9cd7f0000}]) 09:47:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:47:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c090804", 0x7c}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) [ 431.088477] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 431.114118] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 431.126583] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 431.251986] XFS (loop5): SB sanity check failed 09:47:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x60ffffffffff}]) 09:47:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) [ 431.281388] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 431.294572] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 431.326190] net_ratelimit: 22 callbacks suppressed [ 431.326201] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 431.383020] XFS (loop5): Unmount and run xfs_repair [ 431.403767] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 431.427688] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 431.429787] 0000000041d4957b: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 09:47:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) [ 431.455384] 0000000098e413ac: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 431.475704] 00000000df5abc31: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 431.506773] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 431.525539] 0000000052764598: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 431.557961] 00000000df84c580: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 431.638938] 00000000a79fc255: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 431.709798] 00000000c5e6459e: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 431.719731] 00000000c4af69e0: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 431.729224] XFS (loop5): SB validate failed with error -117. 09:47:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:47:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x4000000}]) 09:47:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c090804", 0x7c}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:47:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 431.998087] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 432.012687] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 432.043833] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:47:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 432.086623] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 432.096137] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 432.126457] XFS (loop5): SB sanity check failed 09:47:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0014871d158906e13a97f44a33a05211d4b361f066d610224b3cee99fb964d20e3ce161f213078eaa95b3b6d9628db8d881df0183feee6840dafa5eb73b04305efa7c5fdace971103c2634a2d968332a315b94b574039f291a80b9158e9052d9dd65f1825ca4c86b2852d2191c5002619ea9919ed3c7d45f"]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 432.131484] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 09:47:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 432.184853] XFS (loop5): Unmount and run xfs_repair 09:47:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x4}]) [ 432.216538] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 432.247680] 000000000837b8de: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 432.268867] 00000000287fbfb4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 432.273596] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 432.285390] 00000000f267fcf5: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 432.299882] 000000006db96f29: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 432.317989] 00000000e6bfb3f1: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 432.334920] 000000008b821184: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 432.342234] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 432.353539] 00000000560a20ad: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 432.380093] 00000000b36edbc8: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 432.400046] XFS (loop5): SB validate failed with error -117. [ 432.417334] XFS (loop3): Mounting V4 Filesystem [ 432.424032] attempt to access beyond end of device [ 432.430047] loop3: rw=4096, want=2036888240641, limit=264192 [ 432.436565] XFS (loop3): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 432.445015] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 432.446881] XFS (loop3): empty log check failed [ 432.462580] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x507000}]) [ 432.518980] XFS (loop3): log mount/recovery failed: error -5 09:47:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 432.567475] XFS (loop3): log mount failed [ 432.691559] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 432.714316] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x300000000000000}]) [ 432.810762] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 432.824294] XFS (loop5): Mounting V4 Filesystem [ 432.862158] attempt to access beyond end of device [ 432.877458] loop5: rw=4096, want=2036888240641, limit=264192 [ 432.886539] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 432.906604] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:47:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 432.979431] XFS (loop5): empty log check failed [ 433.010156] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 433.017736] XFS (loop5): log mount/recovery failed: error -5 [ 433.033628] XFS (loop5): log mount failed 09:47:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 433.062273] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x70500000000000}]) 09:47:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 433.214818] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 433.245953] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:47:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:47:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0xff600000}]) [ 433.432237] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 433.451037] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 433.502054] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 433.512682] XFS (loop5): Mounting V4 Filesystem [ 433.530804] attempt to access beyond end of device [ 433.536379] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 433.563728] loop5: rw=4096, want=2036888240641, limit=264192 [ 433.583799] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 433.603379] XFS (loop5): empty log check failed 09:47:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:47:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc001}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 433.615821] XFS (loop5): log mount/recovery failed: error -5 [ 433.630714] XFS (loop5): log mount failed 09:47:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x4000}]) [ 433.734399] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 433.850709] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:47:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 434.128290] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 434.162489] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 434.178507] XFS (loop5): Mounting V4 Filesystem 09:47:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:47:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x930000}]) [ 434.223583] attempt to access beyond end of device [ 434.241554] loop5: rw=4096, want=2036888240641, limit=264192 09:47:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 434.275434] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 434.327740] XFS (loop5): empty log check failed [ 434.332611] XFS (loop5): log mount/recovery failed: error -5 [ 434.362104] XFS (loop5): log mount failed [ 434.420324] netlink: 'syz-executor2': attribute type 27 has an invalid length. 09:47:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x930000000000}]) 09:47:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 434.466402] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 434.493607] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40c00) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 434.518660] netlink: 'syz-executor2': attribute type 27 has an invalid length. [ 434.536975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 434.581373] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xf0ffffff}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 434.658970] XFS (loop5): Mounting V4 Filesystem [ 434.676699] attempt to access beyond end of device [ 434.691120] loop5: rw=4096, want=2036888240641, limit=264192 [ 434.719280] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 434.735835] XFS (loop5): empty log check failed [ 434.743241] XFS (loop5): log mount/recovery failed: error -5 [ 434.785336] XFS (loop5): log mount failed 09:48:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x100000000000000}]) 09:48:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x1c0}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xfffffff0}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 435.043836] device lo entered promiscuous mode 09:48:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x60700000000000}]) [ 435.110587] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 435.182367] XFS (loop5): Mounting V4 Filesystem [ 435.212238] attempt to access beyond end of device [ 435.227166] bond0: lo is up - this may be due to an out of date ifenslave [ 435.239873] loop5: rw=4096, want=2036888240641, limit=264192 [ 435.252773] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xffffff7f00000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 435.287996] XFS (loop5): empty log check failed 09:48:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x200000000000000}]) [ 435.337424] XFS (loop5): log mount/recovery failed: error -5 [ 435.343970] XFS (loop5): log mount failed [ 435.409252] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 435.480124] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 435.560192] XFS (loop3): Mounting V4 Filesystem 09:48:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x9effffff00000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 435.580948] attempt to access beyond end of device 09:48:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x7fffffffefff}]) [ 435.623939] loop3: rw=4096, want=2036888240641, limit=264192 [ 435.657230] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 435.685855] XFS (loop3): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 435.721696] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 435.764709] XFS (loop3): empty log check failed [ 435.778969] XFS (loop3): log mount/recovery failed: error -5 [ 435.797403] XFS (loop3): log mount failed [ 435.803643] XFS (loop5): Mounting V4 Filesystem [ 435.823293] attempt to access beyond end of device [ 435.830888] loop5: rw=4096, want=2036888240641, limit=264192 [ 435.849363] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 435.862971] XFS (loop5): empty log check failed 09:48:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x8100}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 435.868188] XFS (loop5): log mount/recovery failed: error -5 [ 435.875073] XFS (loop5): log mount failed 09:48:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0xffffffffff600000}]) 09:48:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:01 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180), 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xfffffffffffff000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 436.150062] FAULT_INJECTION: forcing a failure. [ 436.150062] name failslab, interval 1, probability 0, space 0, times 0 [ 436.214839] CPU: 0 PID: 16407 Comm: syz-executor3 Not tainted 4.19.0+ #308 [ 436.221909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.231281] Call Trace: [ 436.233921] dump_stack+0x244/0x39d [ 436.237582] ? dump_stack_print_info.cold.1+0x20/0x20 [ 436.242817] should_fail.cold.4+0xa/0x17 [ 436.246910] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.252043] ? lock_downgrade+0x900/0x900 [ 436.256213] ? check_preemption_disabled+0x48/0x280 [ 436.261253] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 436.266198] ? kasan_check_read+0x11/0x20 [ 436.270366] ? __netlink_insert+0xd2c/0x13b0 [ 436.274785] ? __netlink_insert+0xd2c/0x13b0 [ 436.279219] ? find_held_lock+0x36/0x1c0 [ 436.283347] ? perf_trace_sched_process_exec+0x860/0x860 [ 436.288828] __should_failslab+0x124/0x180 [ 436.293087] should_failslab+0x9/0x14 [ 436.296902] kmem_cache_alloc_node+0x26e/0x730 [ 436.301501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.307052] ? check_preemption_disabled+0x48/0x280 [ 436.312087] __alloc_skb+0x119/0x770 [ 436.315816] ? netdev_alloc_frag+0x1f0/0x1f0 [ 436.320245] ? __release_sock+0x3a0/0x3a0 [ 436.324411] ? __local_bh_enable_ip+0x160/0x260 [ 436.329110] ? netlink_insert+0xfe/0x240 [ 436.333202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.338760] ? netlink_autobind.isra.34+0x232/0x310 [ 436.343800] netlink_sendmsg+0xb29/0xfc0 [ 436.347884] ? netlink_unicast+0x760/0x760 [ 436.352129] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 436.357079] ? apparmor_socket_sendmsg+0x29/0x30 [ 436.361852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.361872] ? security_socket_sendmsg+0x94/0xc0 [ 436.361891] ? netlink_unicast+0x760/0x760 [ 436.361909] sock_sendmsg+0xd5/0x120 [ 436.361928] ___sys_sendmsg+0x7fd/0x930 [ 436.384147] ? copy_msghdr_from_user+0x580/0x580 [ 436.388923] ? lock_downgrade+0x900/0x900 [ 436.393093] ? proc_fail_nth_write+0x9e/0x210 [ 436.393116] ? __fget_light+0x2e9/0x430 [ 436.393133] ? fget_raw+0x20/0x20 [ 436.393147] ? find_held_lock+0x36/0x1c0 [ 436.393170] ? kasan_check_write+0x14/0x20 [ 436.413373] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 436.418345] ? wait_for_completion+0x8a0/0x8a0 [ 436.422958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.428511] ? sockfd_lookup_light+0xc5/0x160 [ 436.433027] __sys_sendmsg+0x11d/0x280 [ 436.436930] ? __ia32_sys_shutdown+0x80/0x80 [ 436.441364] ? __sb_end_write+0xd9/0x110 [ 436.441388] ? fput+0x130/0x1a0 [ 436.441405] ? do_syscall_64+0x9a/0x820 [ 436.441421] ? do_syscall_64+0x9a/0x820 [ 436.441445] ? trace_hardirqs_off_caller+0x310/0x310 [ 436.461843] __x64_sys_sendmsg+0x78/0xb0 [ 436.465922] do_syscall_64+0x1b9/0x820 [ 436.469827] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 436.475210] ? syscall_return_slowpath+0x5e0/0x5e0 [ 436.480150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.480172] ? trace_hardirqs_on_caller+0x310/0x310 [ 436.480191] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 436.480210] ? prepare_exit_to_usermode+0x291/0x3b0 [ 436.480233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.480257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.510134] RIP: 0033:0x457569 09:48:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0xffefffffff7f0000}]) [ 436.513360] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.532276] RSP: 002b:00007f345fecfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 436.532292] RAX: ffffffffffffffda RBX: 00007f345fecfc90 RCX: 0000000000457569 [ 436.532299] RDX: 0000000000000000 RSI: 000000002001bfc8 RDI: 0000000000000003 [ 436.532316] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 09:48:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xfffff000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 436.532325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f345fed06d4 [ 436.532334] R13: 00000000004c3afc R14: 00000000004d5bd0 R15: 0000000000000004 [ 436.580693] XFS (loop5): Mounting V4 Filesystem [ 436.598928] attempt to access beyond end of device [ 436.607878] loop5: rw=4096, want=2036888240641, limit=264192 09:48:02 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 436.668952] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 436.727021] XFS (loop5): empty log check failed [ 436.739620] XFS (loop5): log mount/recovery failed: error -5 09:48:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x3000000}]) [ 436.777285] XFS (loop5): log mount failed [ 436.816485] FAULT_INJECTION: forcing a failure. [ 436.816485] name failslab, interval 1, probability 0, space 0, times 0 [ 436.852303] CPU: 1 PID: 16442 Comm: syz-executor3 Not tainted 4.19.0+ #308 [ 436.859372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.868744] Call Trace: [ 436.871359] dump_stack+0x244/0x39d [ 436.875015] ? dump_stack_print_info.cold.1+0x20/0x20 [ 436.880248] should_fail.cold.4+0xa/0x17 [ 436.884348] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.889469] ? __save_stack_trace+0x8d/0xf0 [ 436.893819] ? save_stack+0xa9/0xd0 [ 436.897465] ? save_stack+0x43/0xd0 [ 436.901109] ? find_held_lock+0x36/0x1c0 [ 436.905188] ? generic_setlease+0x1518/0x1bc0 [ 436.909706] ? generic_setlease+0x1518/0x1bc0 [ 436.914214] ? perf_trace_sched_process_exec+0x860/0x860 [ 436.919683] ? check_preemption_disabled+0x48/0x280 [ 436.924715] __should_failslab+0x124/0x180 [ 436.928969] should_failslab+0x9/0x14 [ 436.932780] kmem_cache_alloc_node_trace+0x270/0x740 [ 436.937909] __kmalloc_node_track_caller+0x3c/0x70 [ 436.942863] __kmalloc_reserve.isra.40+0x41/0xe0 [ 436.947634] __alloc_skb+0x155/0x770 [ 436.951362] ? netdev_alloc_frag+0x1f0/0x1f0 [ 436.955786] ? __release_sock+0x3a0/0x3a0 [ 436.959945] ? __local_bh_enable_ip+0x160/0x260 [ 436.964634] ? netlink_insert+0xfe/0x240 [ 436.968712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.974267] ? netlink_autobind.isra.34+0x232/0x310 [ 436.979320] netlink_sendmsg+0xb29/0xfc0 [ 436.983410] ? netlink_unicast+0x760/0x760 [ 436.987659] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 436.992606] ? apparmor_socket_sendmsg+0x29/0x30 [ 436.997378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.002934] ? security_socket_sendmsg+0x94/0xc0 [ 437.007708] ? netlink_unicast+0x760/0x760 [ 437.012252] sock_sendmsg+0xd5/0x120 [ 437.015981] ___sys_sendmsg+0x7fd/0x930 [ 437.019972] ? copy_msghdr_from_user+0x580/0x580 [ 437.024745] ? lock_downgrade+0x900/0x900 [ 437.028910] ? proc_fail_nth_write+0x9e/0x210 [ 437.033420] ? __fget_light+0x2e9/0x430 [ 437.037409] ? fget_raw+0x20/0x20 [ 437.040876] ? find_held_lock+0x36/0x1c0 [ 437.044957] ? kasan_check_write+0x14/0x20 [ 437.049204] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 437.054146] ? wait_for_completion+0x8a0/0x8a0 [ 437.058754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.064317] ? sockfd_lookup_light+0xc5/0x160 [ 437.068826] __sys_sendmsg+0x11d/0x280 [ 437.072731] ? __ia32_sys_shutdown+0x80/0x80 [ 437.077157] ? __sb_end_write+0xd9/0x110 [ 437.081232] ? fput+0x130/0x1a0 [ 437.084700] ? do_syscall_64+0x9a/0x820 [ 437.088683] ? do_syscall_64+0x9a/0x820 [ 437.092680] ? trace_hardirqs_off_caller+0x310/0x310 [ 437.097800] __x64_sys_sendmsg+0x78/0xb0 [ 437.101878] do_syscall_64+0x1b9/0x820 [ 437.105781] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 437.111158] ? syscall_return_slowpath+0x5e0/0x5e0 [ 437.116099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.120958] ? trace_hardirqs_on_caller+0x310/0x310 [ 437.125992] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 437.131057] ? prepare_exit_to_usermode+0x291/0x3b0 [ 437.136092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.140973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.146688] RIP: 0033:0x457569 09:48:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc0010000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180), 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 437.149889] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.168802] RSP: 002b:00007f345fecfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 437.176539] RAX: ffffffffffffffda RBX: 00007f345fecfc90 RCX: 0000000000457569 [ 437.183815] RDX: 0000000000000000 RSI: 000000002001bfc8 RDI: 0000000000000003 [ 437.191103] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 437.198375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f345fed06d4 [ 437.205636] R13: 00000000004c3afc R14: 00000000004d5bd0 R15: 0000000000000004 09:48:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc001}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:02 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x3}]) [ 437.456700] XFS (loop5): Mounting V4 Filesystem 09:48:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xf0ffff}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 437.492436] attempt to access beyond end of device [ 437.535033] loop5: rw=4096, want=2036888240641, limit=264192 [ 437.551995] FAULT_INJECTION: forcing a failure. [ 437.551995] name failslab, interval 1, probability 0, space 0, times 0 [ 437.555675] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 437.573751] XFS (loop5): empty log check failed [ 437.578610] XFS (loop5): log mount/recovery failed: error -5 [ 437.585559] XFS (loop5): log mount failed [ 437.590742] CPU: 0 PID: 16488 Comm: syz-executor3 Not tainted 4.19.0+ #308 [ 437.597802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.607171] Call Trace: [ 437.609785] dump_stack+0x244/0x39d [ 437.613442] ? dump_stack_print_info.cold.1+0x20/0x20 [ 437.618669] should_fail.cold.4+0xa/0x17 [ 437.622757] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.627894] ? zap_class+0x640/0x640 [ 437.631627] ? br_get_link_af_size_filtered+0x1e1/0xce0 [ 437.637008] ? lock_downgrade+0x900/0x900 [ 437.641179] ? find_held_lock+0x36/0x1c0 [ 437.645257] ? __lock_is_held+0xb5/0x140 [ 437.649364] ? perf_trace_sched_process_exec+0x860/0x860 [ 437.654842] __should_failslab+0x124/0x180 [ 437.659095] should_failslab+0x9/0x14 [ 437.662914] kmem_cache_alloc_node+0x26e/0x730 [ 437.667516] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 437.672461] __alloc_skb+0x119/0x770 [ 437.676197] ? netdev_alloc_frag+0x1f0/0x1f0 [ 437.680627] ? if_nlmsg_size+0x5d1/0xbb0 [ 437.684716] ? rtnetlink_put_metrics+0x690/0x690 [ 437.689495] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.695052] ? notifier_call_chain+0x2d4/0x380 [ 437.699654] ? unregister_die_notifier+0x20/0x20 [ 437.704437] rtmsg_ifinfo_build_skb+0x74/0x190 [ 437.709048] rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 437.713912] rtmsg_ifinfo+0x8c/0xa0 [ 437.717569] netdev_state_change+0x152/0x1a0 [ 437.721998] ? dev_valid_name+0x2c0/0x2c0 [ 437.726173] do_setlink+0x2680/0x3f20 [ 437.729993] ? lock_unpin_lock+0x4a0/0x4a0 [ 437.734255] ? validate_linkmsg+0xa50/0xa50 [ 437.738593] ? is_bpf_text_address+0xac/0x170 [ 437.743109] ? print_usage_bug+0xc0/0xc0 [ 437.747192] ? __lock_acquire+0x62f/0x4c20 [ 437.751445] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 437.756390] ? kasan_check_read+0x11/0x20 [ 437.760559] ? __lock_acquire+0x62f/0x4c20 [ 437.764818] ? print_usage_bug+0xc0/0xc0 [ 437.768896] ? print_usage_bug+0xc0/0xc0 [ 437.772978] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 437.778186] ? validate_nla+0x29a/0x1650 [ 437.782268] ? nla_memcmp+0x90/0x90 [ 437.785920] ? __lock_acquire+0x62f/0x4c20 [ 437.790169] ? print_usage_bug+0xc0/0xc0 [ 437.794257] ? validate_linkmsg+0x271/0xa50 [ 437.798598] ? rtnl_stats_dump+0xd70/0xd70 [ 437.802852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.808412] ? __nla_parse+0x12c/0x3e0 [ 437.812347] rtnl_newlink+0x139e/0x1da0 [ 437.816373] ? rtnl_link_unregister+0x390/0x390 [ 437.821055] ? lock_unpin_lock+0x4a0/0x4a0 [ 437.825353] ? print_usage_bug+0xc0/0xc0 [ 437.829440] ? print_usage_bug+0xc0/0xc0 [ 437.833518] ? zap_class+0x640/0x640 [ 437.837245] ? print_usage_bug+0xc0/0xc0 [ 437.841328] ? lock_unpin_lock+0x4a0/0x4a0 [ 437.845586] ? __lock_acquire+0x62f/0x4c20 [ 437.849843] ? lock_acquire+0x1ed/0x520 [ 437.853856] ? rtnetlink_rcv_msg+0x40e/0xc20 [ 437.858291] ? lock_release+0xa00/0xa00 [ 437.862284] ? perf_trace_sched_process_exec+0x860/0x860 [ 437.867775] ? __mutex_lock+0x85e/0x16f0 [ 437.871852] ? rtnetlink_rcv_msg+0x40e/0xc20 [ 437.876283] ? kasan_check_read+0x11/0x20 [ 437.880459] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 437.885780] ? mutex_trylock+0x2b0/0x2b0 [ 437.889867] ? __lock_acquire+0x62f/0x4c20 [ 437.894148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.899710] ? refcount_sub_and_test_checked+0x203/0x310 [ 437.905223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.910774] ? rtnl_get_link+0x170/0x370 [ 437.914853] ? rtnl_dump_all+0x5b0/0x5b0 [ 437.918928] ? kasan_check_read+0x11/0x20 [ 437.923088] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 437.928379] ? ns_capable_common+0x13f/0x170 [ 437.932803] ? rcu_softirq_qs+0x20/0x20 [ 437.936805] ? rtnl_link_unregister+0x390/0x390 [ 437.941496] rtnetlink_rcv_msg+0x46a/0xc20 [ 437.945749] ? rtnl_fdb_del+0xad0/0xad0 [ 437.949758] netlink_rcv_skb+0x172/0x440 [ 437.953833] ? rtnl_fdb_del+0xad0/0xad0 [ 437.957826] ? netlink_ack+0xb80/0xb80 [ 437.961750] rtnetlink_rcv+0x1c/0x20 [ 437.965479] netlink_unicast+0x5a5/0x760 [ 437.969573] ? netlink_attachskb+0x9a0/0x9a0 [ 437.973995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.979545] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 437.984588] netlink_sendmsg+0xa18/0xfc0 [ 437.988684] ? netlink_unicast+0x760/0x760 [ 437.992957] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 437.997908] ? apparmor_socket_sendmsg+0x29/0x30 [ 438.002682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.008225] ? security_socket_sendmsg+0x94/0xc0 [ 438.013417] ? netlink_unicast+0x760/0x760 [ 438.017672] sock_sendmsg+0xd5/0x120 [ 438.021401] ___sys_sendmsg+0x7fd/0x930 [ 438.025396] ? copy_msghdr_from_user+0x580/0x580 [ 438.030176] ? lock_downgrade+0x900/0x900 [ 438.034337] ? proc_fail_nth_write+0x9e/0x210 [ 438.038838] ? __fget_light+0x2e9/0x430 [ 438.042810] ? fget_raw+0x20/0x20 [ 438.046273] ? find_held_lock+0x36/0x1c0 [ 438.050335] ? kasan_check_write+0x14/0x20 [ 438.054576] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 438.059533] ? wait_for_completion+0x8a0/0x8a0 [ 438.064130] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.069696] ? sockfd_lookup_light+0xc5/0x160 [ 438.074203] __sys_sendmsg+0x11d/0x280 [ 438.078098] ? __ia32_sys_shutdown+0x80/0x80 [ 438.082514] ? __sb_end_write+0xd9/0x110 [ 438.086593] ? fput+0x130/0x1a0 [ 438.089896] ? do_syscall_64+0x9a/0x820 [ 438.093864] ? do_syscall_64+0x9a/0x820 [ 438.097846] ? trace_hardirqs_off_caller+0x310/0x310 [ 438.102949] __x64_sys_sendmsg+0x78/0xb0 [ 438.107003] do_syscall_64+0x1b9/0x820 [ 438.110895] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 438.116250] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.121173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.126039] ? trace_hardirqs_on_caller+0x310/0x310 [ 438.131053] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 438.136066] ? prepare_exit_to_usermode+0x291/0x3b0 [ 438.141092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.146268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.151458] RIP: 0033:0x457569 [ 438.154660] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.173556] RSP: 002b:00007f345fecfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 438.181267] RAX: ffffffffffffffda RBX: 00007f345fecfc90 RCX: 0000000000457569 09:48:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 438.188532] RDX: 0000000000000000 RSI: 000000002001bfc8 RDI: 0000000000000003 [ 438.195797] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 438.203057] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f345fed06d4 [ 438.210336] R13: 00000000004c3afc R14: 00000000004d5bd0 R15: 0000000000000004 [ 438.229615] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xf0ffffff00000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x8000000000000000}]) 09:48:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180), 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:03 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 438.437161] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 438.453303] net_ratelimit: 12 callbacks suppressed [ 438.453326] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 438.484927] FAULT_INJECTION: forcing a failure. [ 438.484927] name failslab, interval 1, probability 0, space 0, times 0 [ 438.523950] CPU: 1 PID: 16510 Comm: syz-executor3 Not tainted 4.19.0+ #308 [ 438.531014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.540384] Call Trace: [ 438.542995] dump_stack+0x244/0x39d [ 438.546650] ? dump_stack_print_info.cold.1+0x20/0x20 [ 438.551887] should_fail.cold.4+0xa/0x17 [ 438.555980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.561115] ? __save_stack_trace+0x8d/0xf0 [ 438.565472] ? zap_class+0x640/0x640 [ 438.569206] ? save_stack+0xa9/0xd0 [ 438.572856] ? save_stack+0x43/0xd0 [ 438.576505] ? find_held_lock+0x36/0x1c0 [ 438.580586] ? __lock_is_held+0xb5/0x140 [ 438.584659] ? __ieee80211_sta_join_ibss+0x718/0x27d0 [ 438.589880] ? zap_class+0x640/0x640 [ 438.593608] ? perf_trace_sched_process_exec+0x860/0x860 [ 438.599077] ? check_preemption_disabled+0x48/0x280 [ 438.604111] __should_failslab+0x124/0x180 [ 438.608367] should_failslab+0x9/0x14 [ 438.612187] kmem_cache_alloc_node_trace+0x270/0x740 [ 438.617326] __kmalloc_node_track_caller+0x3c/0x70 [ 438.622278] __kmalloc_reserve.isra.40+0x41/0xe0 [ 438.627062] __alloc_skb+0x155/0x770 [ 438.630797] ? netdev_alloc_frag+0x1f0/0x1f0 [ 438.635223] ? if_nlmsg_size+0x5d1/0xbb0 [ 438.639304] ? rtnetlink_put_metrics+0x690/0x690 [ 438.644087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.649644] ? notifier_call_chain+0x2d4/0x380 [ 438.654246] ? unregister_die_notifier+0x20/0x20 [ 438.659023] rtmsg_ifinfo_build_skb+0x74/0x190 [ 438.663629] rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 438.668491] rtmsg_ifinfo+0x8c/0xa0 [ 438.672137] netdev_state_change+0x152/0x1a0 [ 438.676561] ? dev_valid_name+0x2c0/0x2c0 [ 438.680729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.686287] do_setlink+0x2680/0x3f20 [ 438.690114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.695664] ? __perf_event_task_sched_out+0x33a/0x1bf0 [ 438.701052] ? validate_linkmsg+0xa50/0xa50 [ 438.705391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.710966] ? zap_class+0x640/0x640 [ 438.714700] ? print_usage_bug+0xc0/0xc0 [ 438.718774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.724336] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 438.729542] ? __lock_acquire+0x62f/0x4c20 [ 438.733801] ? print_usage_bug+0xc0/0xc0 [ 438.737885] ? find_held_lock+0x36/0x1c0 [ 438.741965] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 438.747174] ? validate_nla+0x29a/0x1650 [ 438.751254] ? nla_memcmp+0x90/0x90 [ 438.754900] ? __lock_acquire+0x62f/0x4c20 [ 438.759147] ? finish_task_switch+0x1f4/0x910 [ 438.763660] ? trace_hardirqs_off_caller+0x310/0x310 [ 438.768776] ? compat_start_thread+0x80/0x80 [ 438.773204] ? validate_linkmsg+0x271/0xa50 [ 438.777550] ? rtnl_stats_dump+0xd70/0xd70 [ 438.781805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.787360] ? __nla_parse+0x12c/0x3e0 [ 438.791276] rtnl_newlink+0x139e/0x1da0 [ 438.795294] ? rtnl_link_unregister+0x390/0x390 [ 438.799988] ? lock_unpin_lock+0x4a0/0x4a0 [ 438.804239] ? print_usage_bug+0xc0/0xc0 [ 438.808327] ? zap_class+0x640/0x640 [ 438.812062] ? print_usage_bug+0xc0/0xc0 [ 438.816137] ? zap_class+0x640/0x640 [ 438.819878] ? find_held_lock+0x36/0x1c0 [ 438.823961] ? __mutex_lock+0x854/0x16f0 [ 438.828043] ? lock_downgrade+0x900/0x900 [ 438.832205] ? debug_mutex_add_waiter+0x230/0x230 [ 438.837068] ? kasan_check_read+0x11/0x20 [ 438.841227] ? do_raw_spin_unlock+0xa7/0x330 [ 438.845647] ? do_raw_spin_trylock+0x270/0x270 [ 438.850245] ? debug_mutex_wake_waiter+0x630/0x630 [ 438.855185] ? mutex_destroy+0x200/0x200 [ 438.859277] ? _raw_spin_unlock+0x2c/0x50 [ 438.863445] ? __mutex_lock+0x85e/0x16f0 [ 438.867527] ? rtnetlink_rcv_msg+0x40e/0xc20 [ 438.871959] ? mutex_trylock+0x2b0/0x2b0 [ 438.876041] ? __lock_acquire+0x62f/0x4c20 [ 438.880301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.885917] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.891476] ? rtnl_get_link+0x170/0x370 [ 438.895561] ? rtnl_dump_all+0x5b0/0x5b0 [ 438.899643] ? kasan_check_read+0x11/0x20 [ 438.903806] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 438.909103] ? ns_capable_common+0x13f/0x170 [ 438.913531] ? rcu_softirq_qs+0x20/0x20 [ 438.917533] ? rtnl_link_unregister+0x390/0x390 [ 438.922222] rtnetlink_rcv_msg+0x46a/0xc20 [ 438.926480] ? rtnl_fdb_del+0xad0/0xad0 [ 438.930485] netlink_rcv_skb+0x172/0x440 [ 438.934564] ? rtnl_fdb_del+0xad0/0xad0 [ 438.938556] ? netlink_ack+0xb80/0xb80 [ 438.942479] rtnetlink_rcv+0x1c/0x20 [ 438.946214] netlink_unicast+0x5a5/0x760 [ 438.950301] ? netlink_attachskb+0x9a0/0x9a0 [ 438.954735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.960288] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 438.965348] netlink_sendmsg+0xa18/0xfc0 [ 438.969438] ? netlink_unicast+0x760/0x760 [ 438.973690] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 438.978639] ? apparmor_socket_sendmsg+0x29/0x30 [ 438.983414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.988970] ? security_socket_sendmsg+0x94/0xc0 [ 438.993745] ? netlink_unicast+0x760/0x760 [ 438.997999] sock_sendmsg+0xd5/0x120 [ 439.001729] ___sys_sendmsg+0x7fd/0x930 [ 439.005729] ? copy_msghdr_from_user+0x580/0x580 [ 439.010680] ? lock_downgrade+0x900/0x900 [ 439.014856] ? proc_fail_nth_write+0x9e/0x210 [ 439.019373] ? __fget_light+0x2e9/0x430 [ 439.023364] ? fget_raw+0x20/0x20 [ 439.026838] ? find_held_lock+0x36/0x1c0 [ 439.030925] ? kasan_check_write+0x14/0x20 [ 439.035177] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 439.040122] ? wait_for_completion+0x8a0/0x8a0 [ 439.044733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 439.050285] ? sockfd_lookup_light+0xc5/0x160 [ 439.054808] __sys_sendmsg+0x11d/0x280 [ 439.058714] ? __ia32_sys_shutdown+0x80/0x80 [ 439.063140] ? __sb_end_write+0xd9/0x110 [ 439.067221] ? fput+0x130/0x1a0 [ 439.070519] ? do_syscall_64+0x9a/0x820 [ 439.074508] ? do_syscall_64+0x9a/0x820 [ 439.078506] ? trace_hardirqs_off_caller+0x310/0x310 [ 439.083631] __x64_sys_sendmsg+0x78/0xb0 [ 439.087721] do_syscall_64+0x1b9/0x820 [ 439.091630] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 439.097014] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.101961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.106820] ? trace_hardirqs_on_caller+0x310/0x310 [ 439.111863] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 439.116900] ? prepare_exit_to_usermode+0x291/0x3b0 [ 439.121939] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.126808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.132015] RIP: 0033:0x457569 [ 439.135223] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.154376] RSP: 002b:00007f345fecfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 439.162101] RAX: ffffffffffffffda RBX: 00007f345fecfc90 RCX: 0000000000457569 [ 439.169385] RDX: 0000000000000000 RSI: 000000002001bfc8 RDI: 0000000000000003 [ 439.176671] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 439.183961] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f345fed06d4 [ 439.191243] R13: 00000000004c3afc R14: 00000000004d5bd0 R15: 0000000000000004 [ 439.208092] XFS (loop5): Mounting V4 Filesystem [ 439.232011] attempt to access beyond end of device [ 439.243556] loop5: rw=4096, want=2036888240641, limit=264192 [ 439.266995] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0xf07000}]) [ 439.297533] XFS (loop5): empty log check failed [ 439.312034] XFS (loop5): log mount/recovery failed: error -5 09:48:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 439.361993] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 439.363753] XFS (loop5): log mount failed [ 439.418233] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 439.512024] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x1000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x706000}]) [ 439.850665] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x81000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0xf, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x9effffff}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 440.030018] XFS (loop5): Mounting V4 Filesystem 09:48:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x400000000000000}]) [ 440.104007] attempt to access beyond end of device [ 440.116022] loop5: rw=4096, want=2036888240641, limit=264192 [ 440.130285] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0xea0, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 440.154721] XFS (loop5): empty log check failed [ 440.159974] XFS (loop5): log mount/recovery failed: error -5 [ 440.181041] XFS (loop5): log mount failed 09:48:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x100000000000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0xe24, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x4000000}]) 09:48:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 440.448238] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 440.505608] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x67, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 440.553579] XFS (loop5): Mounting V4 Filesystem [ 440.563665] attempt to access beyond end of device [ 440.575473] loop5: rw=4096, want=2036888240641, limit=264192 [ 440.607561] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 440.617618] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 440.664537] XFS (loop5): empty log check failed 09:48:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x1000000}]) [ 440.686507] XFS (loop5): log mount/recovery failed: error -5 [ 440.702819] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 440.718499] XFS (loop5): log mount failed 09:48:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0xe2c, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x200000000000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x400000}]) [ 440.992018] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 441.042298] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 441.157536] XFS (loop5): Mounting V4 Filesystem [ 441.185225] attempt to access beyond end of device [ 441.210594] loop5: rw=4096, want=2036888240641, limit=264192 [ 441.221819] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 441.230970] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 441.257449] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 441.271303] XFS (loop5): empty log check failed [ 441.281467] XFS (loop5): log mount/recovery failed: error -5 [ 441.289371] XFS (loop5): log mount failed 09:48:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x48, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x8100000000000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x400000000000}]) 09:48:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x0, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x25, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 441.465426] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 441.494434] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 441.559073] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 441.569347] XFS (loop5): Mounting V4 Filesystem [ 441.595684] attempt to access beyond end of device 09:48:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0xe20, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0xf0700000000000}]) [ 441.622436] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 441.639838] loop5: rw=4096, want=2036888240641, limit=264192 [ 441.701009] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x2000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0xc7c, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 441.803455] XFS (loop5): empty log check failed [ 441.844481] XFS (loop5): log mount/recovery failed: error -5 [ 441.887859] XFS (loop5): log mount failed 09:48:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x2}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x60ff}]) 09:48:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x20000090, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x0, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xffffff9e}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x7, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 442.225205] XFS (loop5): Mounting V4 Filesystem [ 442.240573] attempt to access beyond end of device [ 442.256981] loop5: rw=4096, want=2036888240641, limit=264192 09:48:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x607000}]) [ 442.271863] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 442.300709] XFS (loop5): empty log check failed 09:48:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xf0ffffffffffff}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x2f, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 442.320868] XFS (loop5): log mount/recovery failed: error -5 [ 442.337679] XFS (loop5): log mount failed 09:48:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x0, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc001000000000000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4500000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x300}]) [ 442.727823] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 442.748176] XFS (loop5): Mounting V4 Filesystem [ 442.755198] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4200000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 442.782726] attempt to access beyond end of device [ 442.787774] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 442.823696] loop5: rw=4096, want=2036888240641, limit=264192 [ 442.862605] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 442.869528] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 442.883252] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x2}]) [ 442.924898] XFS (loop5): empty log check failed [ 442.927730] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 442.934353] XFS (loop5): log mount/recovery failed: error -5 09:48:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x600000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 442.991861] XFS (loop5): log mount failed 09:48:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xffffff7f}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote, 0x0, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 443.175368] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x4}]) 09:48:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xf000}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 443.627023] XFS (loop5): Mounting V4 Filesystem [ 443.653294] attempt to access beyond end of device [ 443.660908] loop5: rw=4096, want=2036888240641, limit=264192 [ 443.666770] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 443.720627] XFS (loop5): empty log check failed [ 443.725470] XFS (loop5): log mount/recovery failed: error -5 [ 443.757246] XFS (loop5): log mount failed 09:48:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000004000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xf0}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x7fcda9bbc000}]) 09:48:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote, 0x0, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 443.932378] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0xc, 0xa, 0xf}]}, 0x30}}, 0x0) [ 444.044868] XFS (loop5): Mounting V4 Filesystem 09:48:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x730000000000}]) [ 444.086086] attempt to access beyond end of device [ 444.106256] loop5: rw=4096, want=2036888240641, limit=264192 [ 444.119753] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 444.142421] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000a00}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 444.183870] XFS (loop5): empty log check failed [ 444.198440] XFS (loop5): log mount/recovery failed: error -5 [ 444.204694] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 444.234371] XFS (loop5): log mount failed [ 444.258245] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 09:48:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 444.335858] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x705000}]) [ 444.386561] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 444.469877] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 444.492274] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 444.528598] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 444.549600] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2200000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 444.603614] XFS (loop5): Mounting V4 Filesystem [ 444.610635] attempt to access beyond end of device [ 444.615724] loop5: rw=4096, want=2036888240641, limit=264192 [ 444.622085] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 444.632247] XFS (loop5): empty log check failed [ 444.638775] XFS (loop5): log mount/recovery failed: error -5 [ 444.646760] XFS (loop5): log mount failed 09:48:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x9300}]) 09:48:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 444.694336] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 444.741576] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 444.797168] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 444.862478] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x730000}]) 09:48:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3900000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 444.936292] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 444.993036] XFS (loop5): Mounting V4 Filesystem 09:48:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 445.034078] attempt to access beyond end of device [ 445.089688] loop5: rw=4096, want=2036888240641, limit=264192 [ 445.128422] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 445.143680] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 445.188391] XFS (loop5): empty log check failed [ 445.206289] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 445.212227] XFS (loop5): log mount/recovery failed: error -5 09:48:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x70f000}]) [ 445.231431] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 445.240272] XFS (loop5): log mount failed 09:48:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3b00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 445.335927] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 445.370008] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 445.435761] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0xc0bba9cd7f0000}]) 09:48:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2f00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 445.695101] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 445.751383] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 445.761886] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x480000000000000c}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 445.799299] XFS (loop5): Mounting V4 Filesystem [ 445.811425] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 445.827986] attempt to access beyond end of device [ 445.843587] loop5: rw=4096, want=2036888240641, limit=264192 09:48:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x60ffffffffff}]) [ 445.878843] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 445.883377] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 445.917363] XFS (loop5): empty log check failed [ 445.922627] XFS (loop5): log mount/recovery failed: error -5 [ 445.931503] XFS (loop5): log mount failed 09:48:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 445.963965] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 446.121586] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x7300}]) [ 446.166643] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 446.245205] XFS (loop5): Mounting V4 Filesystem [ 446.285932] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 446.295379] attempt to access beyond end of device [ 446.303538] loop5: rw=4096, want=2036888240641, limit=264192 [ 446.310255] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 446.325861] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 446.341589] XFS (loop5): empty log check failed [ 446.357598] XFS (loop5): log mount/recovery failed: error -5 [ 446.375044] XFS (loop5): log mount failed 09:48:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x480000000a000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x2000000}]) 09:48:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)) [ 446.686553] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 446.706210] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 446.724828] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 446.753467] XFS (loop5): Mounting V4 Filesystem 09:48:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000009000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 446.802547] attempt to access beyond end of device [ 446.807592] loop5: rw=4096, want=2036888240641, limit=264192 09:48:12 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) fcntl$setown(r2, 0x8, r4) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 446.878476] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 446.927298] XFS (loop5): empty log check failed [ 446.950882] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 446.978232] XFS (loop5): log mount/recovery failed: error -5 [ 447.005277] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 447.006234] XFS (loop5): log mount failed [ 447.068115] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000f0ffffff}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 447.297153] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 447.311966] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 447.353354] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 447.470769] XFS (loop5): Mounting V4 Filesystem [ 447.476986] attempt to access beyond end of device [ 447.483180] loop5: rw=4096, want=2036888240641, limit=264192 [ 447.489404] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 447.500242] XFS (loop5): empty log check failed [ 447.504936] XFS (loop5): log mount/recovery failed: error -5 [ 447.512080] XFS (loop5): log mount failed 09:48:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)) 09:48:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000900}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x0, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 447.679625] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 447.708166] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x480000000000f000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 447.746993] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 447.782058] XFS (loop5): Mounting V4 Filesystem [ 447.824023] attempt to access beyond end of device 09:48:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 447.845265] loop5: rw=4096, want=2036888240641, limit=264192 [ 447.893085] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:13 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xe, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) close(r2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) [ 447.980480] XFS (loop5): empty log check failed [ 447.982290] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 448.014487] XFS (loop5): log mount/recovery failed: error -5 [ 448.048501] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 448.094458] XFS (loop5): log mount failed 09:48:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3300000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 448.149646] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x0, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 448.265080] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 448.277124] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 448.347295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 448.516865] XFS (loop5): Mounting V4 Filesystem [ 448.531405] attempt to access beyond end of device [ 448.545899] loop5: rw=4096, want=2036888240641, limit=264192 [ 448.576870] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 448.647253] XFS (loop5): empty log check failed [ 448.659642] XFS (loop5): log mount/recovery failed: error -5 [ 448.701211] XFS (loop5): log mount failed 09:48:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40081, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000001c0)={r0, r0, 0x10000, 0x100000000, &(0x7f0000000640)="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", 0x4, 0x8, 0x8, 0x8001, 0x7aa, 0x555, 0x4a, "3487dcc7f21448fcf4e383171e27029d62896127e6a0778cb038e5d710652b80a37f227e8f248f9df30b92850690f7ecaffc2fd3c0cfd91bc9679854e2a7c02b255eca68d54b08f05dc31a4a80338bc58e2f8c6b6e3beea0c5413c460a9b78830533edb84e4e2cf96ab2e99be2484378a608e140fcce"}) io_setup(0x7fffffff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0xb00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x0, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 448.777323] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 448.833867] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 448.861094] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3f00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x2, {0x200, 0x80000001, "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", 0x86, 0xffffffffffff7fff, 0x1ff, 0xffff, 0x101, 0x1, 0x7fff, 0x1}, r1}}, 0x128) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) 09:48:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 449.023448] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 449.039538] XFS (loop5): Mounting V4 Filesystem [ 449.069939] attempt to access beyond end of device [ 449.088020] loop5: rw=4096, want=2036888240641, limit=264192 [ 449.105336] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 449.110126] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000060}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 449.141079] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 449.180286] XFS (loop5): empty log check failed 09:48:14 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x20000, 0x0) io_submit(r4, 0x8, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x5, r1, &(0x7f00000001c0)="3bd33147b225b58c36c74d8512bdf011ea36db11916e7d1e2c8252208a45b18066a6572804a04768e60f7318451bce37d8300e918d97178b425f5070f31d8009353c1238b7352e32fee4", 0x4a, 0x252, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f00000002c0)="d0d89af77ba356e0ffb890a61695aac319c56823f742bb66119f113d1fece2008f75212191afa571b8e8ecfa205bc47414324eaf3613111454f8ea4b757c101a6e0449b483fa3e688c8fd6bd9e6a41ee45ce461300", 0x55, 0x8, 0x0, 0x1, r5}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x7, r3, &(0x7f0000000380)="d50359f7c50be81164e6a05651c4520360ddb5d6685d685e42bbdc2db83cdb13eb93332b60aa12046542", 0x2a, 0xc41, 0x0, 0x1, r5}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0x2, r2, &(0x7f0000000400)="645f79d4db2dcb1d232dc11257f38f5b2be9f1d27c3b9702", 0x18, 0x3, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x7, 0x2, r0, &(0x7f0000000480)="084364bc47a9b3ae6e03442d4ca327dcc4635961ad188f4d9f6ad40f320c04a76df393df85fd7e9e714c753c6ba49fbb021c0ac2e452b5461fe6376c611a", 0x3e, 0x20, 0x0, 0x0, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x100, r0, &(0x7f0000000640)="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", 0x1000, 0x8000, 0x0, 0x0, r5}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0xb, 0x400, r5, &(0x7f0000000540)="3c211e30d561b95fc4ac74403b0929d1d0cba41053a21354ac4243cea63eccaaf5db96046cf2b39e53d88bca93726f40f20b7dc623639f916933a3aac380e33fc82ceae6d0adda0a59ad45563aa62c87152ef9f4378169ccf5f2bf5ea9c3d88476a38fa86dac3c5c5c3a4b664d5fd383d62fa3bf8653847f0caf8e48b25cc748949fc71e2ef1e581e9fad4d712a4eba050c09f165a", 0x95, 0x3, 0x0, 0x5, r5}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0xf, 0x5f, r5, &(0x7f0000001680)="9c55d2e2da9638b02305b1376e4a731b9997107c1c76ae0a1f6c66703880ef7911607bed3a54d695d7", 0x29, 0xd5, 0x0, 0x1, r5}]) [ 449.201012] XFS (loop5): log mount/recovery failed: error -5 [ 449.222536] XFS (loop5): log mount failed [ 449.242516] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000006000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 449.437239] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4300000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 449.486726] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 449.497791] net_ratelimit: 16 callbacks suppressed [ 449.497801] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x42000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000002c0)={{0x2, 0x0, 0x20000, 0x2, 0x6536}, 0xd0e9, 0xe48, 'id0\x00', 'timer1\x00', 0x0, 0x5, 0x4, 0x5, 0x3}) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 449.594618] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 449.670259] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 449.680817] XFS (loop5): Mounting V4 Filesystem [ 449.709490] attempt to access beyond end of device 09:48:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2100000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 449.715233] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 449.728271] loop5: rw=4096, want=2036888240641, limit=264192 [ 449.742543] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 449.791963] XFS (loop5): empty log check failed [ 449.812132] XFS (loop5): log mount/recovery failed: error -5 [ 449.835096] XFS (loop5): log mount failed 09:48:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x501c40, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x2}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r3, 0x9, 0x4, 0xff}, &(0x7f0000000200)=0x10) setsockopt$inet6_int(r2, 0x29, 0xf, &(0x7f0000000240)=0xffff, 0x4) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000005c0)}], 0x1200000, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) getgid() lsetxattr$system_posix_acl(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{}], {0x10, 0x1}}, 0x34, 0x1) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000840)={{0x0, @empty, 0x0, 0x0, 'wrr\x00', 0x0, 0x0, 0xd}, {@loopback, 0x4e23, 0x0, 0x0, 0x8000, 0x1ff}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0xc, 0x2000) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000003c0)={0x0, 0x1000}, &(0x7f0000000400)=0x8) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) openat$vnet(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-net\x00', 0x2, 0x0) mq_open(&(0x7f0000000000)='vcan0\x00', 0x801, 0x101, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, 0x401, 0x0, 0xfffffffffffffffa, 0x4}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80) dup2(r5, 0xffffffffffffffff) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0xdbd7, r0, &(0x7f00000002c0)="dc7735fa542ca5d51c011184c1d9e752264c7877e15014e84de01dc391984fec88dad36a66c5c2241b9c0a1c0f4b276ef482d38761a396b5cfe4d2e09016d37aa9b822d6533479bcaf889e555b501831218e49f92a3b8bb60045b00555403571b63c6d616e587f3b1600c0b5e2bb0f6c36204e43b309e1", 0x77, 0x1000, 0x0, 0x1}]) 09:48:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 449.885211] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:15 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 449.986749] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4700000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 450.038810] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 450.130293] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) [ 450.187916] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 450.244575] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 450.269997] XFS (loop5): Mounting V4 Filesystem [ 450.305471] attempt to access beyond end of device [ 450.323251] loop5: rw=4096, want=2036888240641, limit=264192 [ 450.362785] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 450.387465] XFS (loop5): empty log check failed [ 450.392160] XFS (loop5): log mount/recovery failed: error -5 [ 450.418197] XFS (loop5): log mount failed 09:48:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3600000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) [ 450.590915] overlayfs: filesystem on './file0' not supported as upperdir [ 450.634184] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 450.657589] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 450.753177] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 450.777860] XFS (loop5): Mounting V4 Filesystem [ 450.790774] attempt to access beyond end of device [ 450.800755] loop5: rw=4096, want=2036888240641, limit=264192 [ 450.815252] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 450.847283] XFS (loop5): empty log check failed [ 450.860086] XFS (loop5): log mount/recovery failed: error -5 [ 450.875625] XFS (loop5): log mount failed [ 450.884146] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x10000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x40100, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x90, r3, 0x400, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x25, 0x38}}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x75}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4bba680b}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x58}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x40) 09:48:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 450.920217] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) 09:48:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000009}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 451.087554] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 451.137756] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 451.208356] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 451.236399] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000013050000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 451.268177] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:16 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x101000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000001c0)=""/133) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 451.342596] XFS (loop5): Mounting V4 Filesystem 09:48:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) [ 451.379588] attempt to access beyond end of device 09:48:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 451.408524] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 451.416824] loop5: rw=4096, want=2036888240641, limit=264192 [ 451.424879] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 451.447033] XFS (loop5): empty log check failed [ 451.469508] XFS (loop5): log mount/recovery failed: error -5 [ 451.480996] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 451.492552] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 451.495797] XFS (loop5): log mount failed 09:48:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000081000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 451.523842] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 451.545010] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:17 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(r1, 0x0, &(0x7f0000000000)) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) close(r2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x9, 0x0, [], [{0x6, 0x80000000, 0x80, 0x7, 0x44b, 0x5}, {0x5, 0x4, 0x4, 0xc000000000000, 0x80000000, 0x8001}], [[], [], [], [], [], [], [], [], []]}) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) [ 451.639509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3500000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) [ 451.761965] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 451.800480] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 451.825044] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1a00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:17 executing program 4: r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x3e9841, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/41, 0x29}, {&(0x7f0000000200)=""/1, 0x1}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x3, &(0x7f00000002c0)=""/209, 0xd1, 0xfffffffffffffffc}, 0x100) ptrace$getregs(0xe, r0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) [ 451.961241] XFS (loop5): Mounting V4 Filesystem [ 452.004225] attempt to access beyond end of device [ 452.005173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 452.027130] loop5: rw=4096, want=2036888240641, limit=264192 [ 452.041288] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) [ 452.070697] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 452.080227] XFS (loop5): empty log check failed [ 452.095450] XFS (loop5): log mount/recovery failed: error -5 [ 452.107892] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1600000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 452.130741] XFS (loop5): log mount failed 09:48:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 452.210690] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:17 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0x368508c039717437}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000240)='bridge0\x00') ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f00000001c0)) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={r3, 0x28}) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r5, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) recvfrom$llc(r4, &(0x7f00000002c0)=""/19, 0x13, 0x40, &(0x7f0000000300)={0x1a, 0x339, 0x40, 0x3, 0xfd8, 0x27ae, @remote}, 0x10) 09:48:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 452.329013] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2700000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 452.392272] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 452.469583] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 452.478476] XFS (loop5): Mounting V4 Filesystem [ 452.500259] attempt to access beyond end of device [ 452.522448] loop5: rw=4096, want=2036888240641, limit=264192 09:48:18 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x37cdfd36d48bb2de) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r1) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000000)) [ 452.563288] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 452.579539] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0xc00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 452.622077] XFS (loop5): empty log check failed [ 452.653402] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 452.674681] XFS (loop5): log mount/recovery failed: error -5 [ 452.687984] XFS (loop5): log mount failed 09:48:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 452.766508] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:18 executing program 4: set_tid_address(&(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) accept(r0, &(0x7f00000000c0)=@hci, &(0x7f0000000040)=0x80) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 452.839377] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4400000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 452.920948] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 453.002747] XFS (loop5): Mounting V4 Filesystem 09:48:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 453.029560] attempt to access beyond end of device [ 453.033988] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 453.034669] loop5: rw=4096, want=2036888240641, limit=264192 [ 453.059648] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 453.062081] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(0x0, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3100000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 453.079941] XFS (loop5): empty log check failed [ 453.084951] XFS (loop5): log mount/recovery failed: error -5 [ 453.097048] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 453.119771] XFS (loop5): log mount failed 09:48:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 453.253153] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000008}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 453.377802] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 453.437401] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:19 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 453.485481] XFS (loop5): Mounting V4 Filesystem [ 453.496834] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 453.503517] attempt to access beyond end of device [ 453.514836] loop5: rw=4096, want=2036888240641, limit=264192 [ 453.536191] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 453.583522] XFS (loop5): empty log check failed [ 453.603091] XFS (loop5): log mount/recovery failed: error -5 [ 453.615302] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 453.633864] XFS (loop5): log mount failed [ 453.653167] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000500}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:19 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) memfd_create(&(0x7f00000001c0)='security\x00', 0x6) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) 09:48:19 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0xc0}}, 0x0) 09:48:19 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r0}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:19 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 453.911359] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 453.931879] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:19 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 453.947454] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1100000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:19 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0xf}}, 0x0) 09:48:19 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000008c200, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000240)) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000200)={0x3, 0x0, 0x80000001}) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f00000001c0)=r5) 09:48:19 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 454.101260] XFS (loop5): Mounting V4 Filesystem [ 454.137139] attempt to access beyond end of device [ 454.149342] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 454.158130] loop5: rw=4096, want=2036888240641, limit=264192 09:48:19 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x10}}, 0x0) [ 454.188806] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 454.207916] XFS (loop5): empty log check failed [ 454.235591] XFS (loop5): log mount/recovery failed: error -5 [ 454.250981] XFS (loop5): log mount failed 09:48:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1500000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0xec0}}, 0x0) 09:48:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r0}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:20 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e24, 0x6, @empty, 0x7}, {0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x16}, 0x8001}, 0x9, [0x5, 0x3fc, 0x4, 0x7fff, 0x5, 0x0, 0x5, 0x80]}, 0x5c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 454.583958] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 454.604594] net_ratelimit: 18 callbacks suppressed [ 454.604605] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 454.639715] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 454.655444] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 454.673146] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x140, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 454.706858] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x20000030}}, 0x0) [ 454.806115] XFS (loop5): Mounting V4 Filesystem 09:48:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x900000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 454.829159] attempt to access beyond end of device 09:48:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 454.865129] loop5: rw=4096, want=2036888240641, limit=264192 [ 454.895074] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 454.917696] XFS (loop5): empty log check failed [ 454.930749] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 454.936176] XFS (loop5): log mount/recovery failed: error -5 [ 454.952877] XFS (loop5): log mount failed 09:48:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x33fe0}}, 0x0) 09:48:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0xc00e000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 09:48:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r0}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 455.209502] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 455.223753] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 455.246419] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 455.268447] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 455.278901] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x7ffff000}}, 0x0) 09:48:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r0, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, 0xffffffffffffffff, &(0x7f0000000140), 0x2000072e}]) [ 455.332202] XFS (loop5): Mounting V4 Filesystem 09:48:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3c00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 455.395805] attempt to access beyond end of device [ 455.415280] loop5: rw=4096, want=2036888240641, limit=264192 09:48:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x8}, 0x0) [ 455.443553] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 455.466949] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 455.467065] XFS (loop5): empty log check failed [ 455.492134] XFS (loop5): log mount/recovery failed: error -5 [ 455.508239] XFS (loop5): log mount failed 09:48:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1400000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 455.585592] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x0, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40040, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x40000000000000, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e23, @local}, {0x2, 0x4e24, @multicast2}, 0x40, 0x6, 0x6, 0x4, 0x80000001, &(0x7f00000000c0)='bond_slave_0\x00', 0x400, 0x8, 0x7}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 455.652664] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 455.731219] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 455.740560] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0xffffff1f}, 0x0) 09:48:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) [ 455.778084] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) sendto$unix(r0, &(0x7f00000001c0)="49e0b36f5c43a81f88557e9ad35838683f616f4ac26997b20ec3f5e68104c6460d9d5f4df94cdd67148fddd5cb0100f37bd1a802b431ccf8de7364fc5399e39898a61a8d7723378e3d37aea3df1773b59a8dd7558ebfc544922b5d0587f89603efe8ff806f6d4204e4774cc6a533881a1904a8d60bc5a3ca359f26db877f9f4a3beaa696db9d32aa43af581f5122091cde04869c940a883da10da0c78d9bb9caaf720882d11974c9df2ee13e3d78fef04675726a208828a700e990889d8f41", 0xbf, 0x40000, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 455.883245] XFS (loop5): Mounting V4 Filesystem 09:48:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) 09:48:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2900000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 455.907306] attempt to access beyond end of device [ 455.913475] loop5: rw=4096, want=2036888240641, limit=264192 [ 455.935583] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x500}, 0x0) [ 455.967522] XFS (loop5): empty log check failed [ 455.984601] XFS (loop5): log mount/recovery failed: error -5 09:48:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) [ 456.007809] XFS (loop5): log mount failed [ 456.025563] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x2}, 0x0) 09:48:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x0, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000fffff000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x10, 0xffffffffffffffff, 0x0) [ 456.183826] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 456.236452] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 456.268413] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 456.323237] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 456.342409] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000200)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1', "f78bf5d9140722c87a31423f625583c9e790a1e3f389f3941604a57214b35e8d3817658ddcfdbfa8747e362f10adab2fbe5b2b345a532d9f52fc06af1e7273d7c47ba115794a0b17e830a4d9f8662340cbccaf9121f6b22ea79b34"}, 0x5f) 09:48:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000400)="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", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000040), 0xfffb) fcntl$addseals(r1, 0x409, 0x8) shutdown(r0, 0x1) 09:48:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2e00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 456.379298] XFS (loop5): Mounting V4 Filesystem [ 456.412760] attempt to access beyond end of device 09:48:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x200000000000000}, 0x0) [ 456.444289] loop5: rw=4096, want=2036888240641, limit=264192 [ 456.466392] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 456.479982] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 456.488306] XFS (loop5): empty log check failed [ 456.496695] XFS (loop5): log mount/recovery failed: error -5 [ 456.505082] XFS (loop5): log mount failed [ 456.510555] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 456.522772] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0xd00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xffffff7f}, 0x0) [ 456.547028] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 456.558005] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x0, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x7, &(0x7f0000000000)) 09:48:22 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="006340400000000000000200e0a94f43078936d0940e314a35"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) [ 456.677452] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 456.733307] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:22 executing program 0: socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x7fff, @ipv4={[], [], @dev}}}]}, 0x110) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000b40)=0x80) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) rmdir(&(0x7f0000000bc0)='./file0/file0\x00') ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000700)) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) clock_gettime(0x0, &(0x7f0000000ac0)) [ 456.818414] XFS (loop5): Mounting V4 Filesystem [ 456.832045] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 456.848614] attempt to access beyond end of device [ 456.859869] loop5: rw=4096, want=2036888240641, limit=264192 09:48:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x8002) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000000c0)) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 456.881008] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 456.922417] XFS (loop5): empty log check failed [ 456.946142] XFS (loop5): log mount/recovery failed: error -5 [ 456.985564] XFS (loop5): log mount failed 09:48:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2400000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x81000000}, 0x0) 09:48:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3e) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:48:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x0, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 09:48:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) io_submit(r3, 0x3da, &(0x7f0000000600)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000002c0)) [ 457.263265] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 457.300201] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0xa00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 457.343374] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 457.364257] XFS (loop5): Mounting V4 Filesystem [ 457.372675] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 09:48:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x9effffff}, 0x0) [ 457.411665] attempt to access beyond end of device [ 457.416797] loop5: rw=4096, want=2036888240641, limit=264192 [ 457.434134] bond0: lo ether type (772) is different from other slaves (1), can not enslave it [ 457.435188] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 457.466208] XFS (loop5): empty log check failed [ 457.468140] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 457.471094] XFS (loop5): log mount/recovery failed: error -5 [ 457.492718] XFS (loop5): log mount failed 09:48:23 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) memfd_create(&(0x7f0000000000)='syz1\x00', 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000080)={{}, "73797a310000000000004b1a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000800"}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) read(r0, &(0x7f0000000d00)=""/4096, 0x1000) [ 457.518435] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 457.530267] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3a00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x0, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x0, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xf0ffff}, 0x0) 09:48:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(0x0, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 457.748522] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 457.774055] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x2000000}, 0x0) 09:48:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2c00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 457.798283] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 457.829299] XFS (loop5): Mounting V4 Filesystem 09:48:23 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = memfd_create(&(0x7f0000000000)='cgroup\x00', 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x90, &(0x7f0000000b00)=[@in6={0xa, 0x4e22, 0x9}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e24, 0x7fff, @empty, 0x5}, @in6={0xa, 0x4e24, 0x1, @remote, 0x800}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0x3, @loopback, 0x2d8000000000000}]}, &(0x7f0000000bc0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000c00)={0x3, 0x9, 0x1, 0xffffffffffff0000, 0x7, 0x2, 0x3, 0x4, r6}, 0x20) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000200)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000580)=0xc) r9 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002180)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f00000005c0)='wlan0\x00'}, 0x30) r11 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000028c0)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000029c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002a00)={0x0}, &(0x7f0000002a40)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000003400)={0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003440)={0x0, 0x0}, &(0x7f0000003480)=0xc) fstat(r0, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003540)=0x0) r18 = getuid() r19 = getegid() r20 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003580)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003680)=0xe8) getgroups(0x6, &(0x7f00000036c0)=[0xee00, 0xee01, 0xee00, 0x0, 0xee00, 0x0]) sendmsg$netlink(r3, &(0x7f00000037c0)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfe, 0x400}, 0xc, &(0x7f0000003380)=[{&(0x7f0000000640)={0x4b4, 0x37, 0x2, 0x70bd27, 0x25dfdbfd, "", [@nested={0xec, 0x51, [@generic="663d002be2cbaaf05427d789b6a3317a31efb51daabb8aa4bdff64ea48dfef7d0a0bfdfbc4f53477a8451ebf533ed8dcbac94c8b641a844a38030f56e1fda08684350f5053f74b9cbdb000327c1705fd1a48d1fac24dd9eadb195d4a7d7861933ed8ea05f68dff3561f99c9e58a40257bbe78ddf1462bea77b9e44a4f4f2c21616031a915f931c81ac1d17f8aa7ca878485868c179c01d53c752ad1e5627301a2e0b032bbf0ad322eddfa0a2374643a35381cc1ea87991364ee13f046bebbbe8b6e4291f9a73492eb87f4bc95129d9a5f642fc4e4cffc28fba6ea5f804d2b8d0a18bb6eef6d4"]}, @nested={0x398, 0x5e, [@typed={0x9c, 0x36, @binary="1f8e2e0da0981532fca59ae15dbd8c6e3827517a375a725b17153304932522966639de3a6c190ad3d3a8a69e50a0a96371799ea76c28947098d9f9839ea9f6de742e6dfe6e9738e6fea7de92b9d7473fb32dc855d56501264a889a5f0e34cd618af9989f58d1c9c9d9f3f1747b81860f9753ecb8b8b3fb109b43ef0d78dd6ee181c5fb4c0192c26baff2a415ba0f47753c9a25f221798b"}, @typed={0x8, 0x51, @uid=r4}, @generic="008f377a9b23bcd60678acb08ec634dffc4b44b74e16ed7bb2fb3844ca105e692d4986819290f0226a012d3746d40730c32668b1dd15bc68578a243a89760c271738a8febc5bf14b75339d354e581b6950c1958e98484e2c66d89ed3152da3e3aa66d2eb95576bc1", @generic="5563d88f330d5c0c134bf8484982c428ceae1691bc50a9db88dce1c6ada1e3cec791038745748c71b5b0dc5f557868681979c93018258d26efc592a4a1cb4f092b3c3ba302522d53454f625ba4ea419cca1989c17fe784af7c193980eafae032db35c3bef80c5f39248420238ca1d404d429bc5b0ff6140d285ff31356cc1d98c578a6ae9ae452d0c059ac0e384facae5197ee4336bbd83c2e42d9f1c16101c179691302196df71c37affc1d59745f1cae0849adc1bf10ad035fc9b5321fa6edfa5be1", @generic="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", @generic="b55cb363256812a73ff1cd44980f74e67513517049cc00395cdf9e66ae51d11350435e4695e45d69bcecb19f84877f8520839f8a51de9fdd80420b9b5d07a60c80d633ccb1893db362db8969168f6a19353f1689c56dad0a7141b8b83e4970018adeb1eb0c38e45e6ebf7866c21f57ab77ba8053463a5aa1dc5a896f9ecd240ccd7b31289759c6a9e0d95782798b365571a69490aa05db1813b7b58d712d1915e2a51624987ddfb3ba7c8706972a1f75e0ad3e0316ffe0e36f3ed6326019a38b0fa8e343ba94b32cd077"]}, @typed={0xc, 0x3f, @u64}, @typed={0x14, 0x1f, @ipv6=@loopback}]}, 0x4b4}, {&(0x7f0000003840)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="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"], 0x43c}, {&(0x7f00000003c0)={0x1ac, 0x3d, 0x200, 0x70bd25, 0x25dfdbfe, "", [@generic="73b4e53bfb7d19b4995318792334e0e6adb87ca8e4aa09e3fd0979c0adee34bff443a3aa670ac0615998b42a486b163e668b93da38447d557e0cd23501b37b70356eba680326e4fc00cbdb5d6ffbcf6f554a6ce7ce6206151e180558f6dca57d59c2bb96fcb3673f52ca2c222691ed4bb78eef9d0dbc3936151a8767a4ae3eda88c72d46431ab8934c1029d72147639c44434f572c4294b3b283b31ad928ab", @generic="96a3e71efda085b9e9f43486a6c7309dafbbc79b43345a3db70e46aa7334fde4ac600aee0faa4509806f475e10fcc7ed8c790590de705e7752b80735bc25f84acfae9ec1147bb94327f843fa96891fd4f22a82d90678883f00fbca3733e2f0d8842754fdb523ff63ab13b65db76c13c3fe13c25331847e64891f396d5b682ff26d0e16f1c2f2b133d83005ea9fbd67d51d4e3b24985da7f40f80b6c5f4547e3fd6739f0b7c0e191931fb2dd42de57867de7fb99e99c42303cc95692ad9ff366b5bc9406c80a24959e3c31629d0dbbed1aec14ebccbe55664d123a4e675059654e07591cc66f8257bd8e39088a324fe59a022", @typed={0x8, 0x76, @ipv4=@remote}]}, 0x1ac}, {&(0x7f0000000f40)={0x1210, 0x32, 0x210, 0x70bd25, 0x25dfdbfd, "", [@generic="e3f5a9c9b4f28439a647a7680a4eb362da07dc186408bd37ac9d578828ec9b54be83bb888759314106fb6de87975dc671627ca82f3a13b35edf8bfbade7652eec3568e2805576e79fd840d16c0d26f72cd5a994133bdf6cbcf16867afddef7cf356c9f93f410bb912d46e423b98626103884cfd0df38a4b2c6e36f1d3886e69ac2", @typed={0x4, 0xa}, @generic="1a5ecf7a6cab227a104fbe73a19a5da2d9fdd25333183c7cf0ca4a1086b7b3143f7449507dabc31a91b14ae9c51e617c16cc0f1d257d0a8f198fba25dc902a2f18b90e21e405f7b0d9960bf9d992b8c1a4485e4dfbbcdeffe812aac72480cbf2bfec59a55c818dd1cb65af33e618ab92b0029727ca8d2910cdd25a132ec5fc1ff0b2e2ffca0d0ca14bf5e5429315e1a81e2195abb019e70e", @typed={0x8, 0x5f, @pid=r7}, @nested={0x10d8, 0x1f, [@typed={0x8, 0x1b, @fd=r2}, @typed={0x8, 0x96, @fd=r2}, @typed={0x1c, 0x2b, @binary="749776c5cb84483afd7e0353880e4a347ba148b1d1f5"}, @typed={0xc, 0x1a, @u64=0xd1}, @typed={0x8, 0x6c, @pid=r8}, @typed={0x14, 0x94, @str='/dev/vhost-net\x00'}, @generic="652c2e57d197a15bb65d26b2407825c12a30363b02b184f4207b5108509a3bafb73a646cc5198d8b45df830ea41b679dcf24361d3bfe36f3deadc4f1724070387b42e22370fe88746913ebaafe90db94332b6cfbeeb66550e8f5358bf1b8c76ce16cce7d7e2e5e4cb5b34760aa82a671b1", @typed={0xc, 0x1e, @u64=0x5}, @generic="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"]}]}, 0x1210}, {&(0x7f00000021c0)={0x6f0, 0x33, 0x300, 0x70bd25, 0x25dfdbfd, "", [@generic="9fa0cae2a412e954ebd543e25c249bf1e5e9207bb1e8f4122bf271e07159d0d77f0fa57e2fc8280e", @typed={0xc, 0x46, @str='wlan0((\x00'}, @nested={0x134, 0x86, [@generic="fe0db836860b128b9b3507354539d29405c2eeb55aae4144810ae18cdbcc1ad24d93e3d4e5ab411388a47147be56ece11af15b0ae31a1ff944843233f871caf0", @typed={0x8, 0x6d, @ipv4}, @generic="76390e83c10000df734bbe473b6c010b0665fdfa895e339994e4706973698905790230c5b7d1b9f27a18823f5804dbc11182bcea243a0a157314e4b89cb2d4babc689f07737f47c3c2f50296095a5cb5090c8e158119e742a05535820da2818b3635605aa16b8a8e799ba5a48797f1bb1fa0c59869084d1860670888cf2cac519e48a30db8fe4dce02b5631dff11366efb90ba5eecb85e0aa3beb3e121253a74315f05d5671d25e65656034f61df3cb20c109c97d5da2f8fba6fd59d331fd1b9c8297d2580715cbd2b669df594cbdaf90cd72e915a135b242800943d68c2327d98d9cc6ec9"]}, @generic="96969ca9a71155dc7c10e24a3b3a012451d3fc70c510906f5b3af980f90cba4d70cb17417c1a047aab51c45a5df463b11dc997bf669e1332f1af0a294ae3c284eb1867576c2cb6de7132d2489cb69358c36a6ce92370c686b837ead0068c4ba5ab56aeed01db59dfdabf6f4a0cff7d527b59e6f3cbf779a9b6178f27bab90eee83c15396811c63651e2b03be19b4ae56934526f32e79887d1bbd2cf49577d3c2903e6afebbe3b627", @nested={0x208, 0x91, [@typed={0xc, 0x1f, @u64=0x6}, @generic="bc5591b6017c2e949c5a5817c482c0e8f77b3d15eb5b5f5335af3c61b77f42780f5babe1157bf655b90f6646fb2244b23e929066743c34cae4573d36d943244c3632b40dec8f42ef512d98ecf937e3de36319b54b65053fc372c147d899505741c4e6e5561508f7c1471808c0b97568378015c7a4fae093c99071e099f39e4bcfe56738b817160c5d584f0d48cf64b285d5f26ae580ed0cfcd3db662bbb0d8ddf59e645bee60a2bccd01a0942179071a5bbf8fcf8ac0cf19e942314b0ddef0", @generic="2160cd027f0fb3121886ed52a3d2f42ac6ff0b21dc684ff1bb8fd2a6286e15847ef70a3b9a00d7a7502fa08d46d674f606b1909e738f6fb11ddea5afd4dea9433daf7388422dd6faf644f2e666daf53f6234388cb263f5f6fbc4a253fc5b8d9b02d407a67b0018cd1845aed0dfa981982ad78d661a3ef8c6c76593c925f9155c91a19de337c4844244f695e3e7e3ff1853d94860c0a1f42694b612e08d39e18593", @typed={0x14, 0x2, @ipv6}, @generic="8e271b18b8f939f1f1e9c9c3bd206d96285448bae16a2b613264c361e5503cbe36beff0a3a92444ed32d348de2c507073703358ae1b21878f063df01abd9666474eb5dbbddb54efaac4e6fe9d3329d3ca9d3056c20de439f26aebefcba35f907c073fff42f1adc5cfb49713ebb3a4c96f3b5e9930e3a978e72232a6a93dbffa8ef"]}, @generic="d2eaa8addd7a46389d8561f8e10a707832ffbabd1d5cf72a2dc49d0e34281c3e5abdfeb4af53e06a272d8bc07e979dabde66b310af72f8e6428281c97c5d84c1382d0d62901871601e137f540e8eb436c3e95724b3777c70d12d6a7364dabf2c1c39b04ce8bd19a3a33891ce555676f55cfb4d3e5938d2c884b41f9b7ed6f1bc9212d530b96eee905fd0f59b970a1d70d2c8607fed142e7b024fb0d40b6589129e39a8613b75880f9817044aaac500ee5c672b30470a1012c413605cbd885631c20dc695018669541ef948bbc6c57bdad04f36db0644a5f261d48f178b58dd410628fd4c3f5f927bfb10a9858932d3c5c9b40a", @nested={0x1cc, 0x0, [@generic="86", @typed={0x8, 0x63, @pid=r9}, @generic="8161935d143083a2d98a62743005cafb4c9564cee6fddc36a82cf16dd585a202f7b35e52f38acba07305fad02242e2569b67fcc60079d3b7f88599df7e3c031d5f48d4141a30e4ac0144a5740636c9634c5a1a146a1a", @generic="ed03162ff53fce24f498e29ac606e109daea53f711e1ac352d561fb7f3", @generic="f2d45f2b1bdf894d9811f8fbcd29fe255c699890c613b63928905ee15271ef9c4d97e17d9ff61e5d6b0fb06bde920b86a1e383fce14227984af449a6dced26e5baca910fb54219d6df9fd97bd7e2e1de33", @typed={0x8, 0x2f, @pid=r10}, @generic="1d80765fa22298fe248c676b7ac4e15e2924a6e1c696b546f40b3e020fce378b3e3f55933099bd04880ffa68a51456b489f707cb5ed6a670dc2bd746cec9d1ce1440b2eeaae9e640b5348240925e94660dc02e43fb6fef3764aaca6f418c5bb74955fdcd360dfc3b552533435f322392c18d791eb7239f42032b78aa02cbdf481f384c2124a3195da38ce7419d63a783da9277afd7e9345127e6891fe2c2bb3450ea6bac914c0a5bdd34e845c1bd443e90270b55fbd1462d301bb987472e655c10c200a3a17ec0350901e39d30c1561a14f01dfe13e525b2dfe278cca0c2", @typed={0x14, 0x56, @ipv6=@dev={0xfe, 0x80, [], 0x1d}}]}, @nested={0x8, 0x74, [@typed={0x4, 0x49}]}]}, 0x6f0}, {&(0x7f0000002a80)={0x8ec, 0x16, 0x310, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x8, 0x5d, @u32=0x8}, @nested={0x338, 0x91, [@typed={0x8, 0xe, @u32=0x1ff}, @generic="80b2c362aedcce4ea4d8e8c66e95ce318ca8b6611520608356063f98b16b9ef97d5bb239aae95ae267909f15df87a77465fd1fdf57f24804b4ffd5eb2f1ce57f876de240d3969f15af6eb9d1a987b863e0", @typed={0xc, 0x90, @u64=0x2}, @generic="1fc5d89498bf80c7c230b75d22da5d4cf886a78aea4120c015b7324b1d1fcfb73c6d3381045be33e6785a13ee3eb369441a3024f42463db607884a03d1b6d8f7bba15371c9bb2eab629d11075dbb498cfb9de5751bdd6893161465b9437e9375f488e402a5210afaaf14852be55a1c716681718139248e309cec06070f21e084e751e03ea71d1c1c01643e59f5a2e5ce60afa58392437095dab5f829a176", @generic="a35677bfd12ae65527e81551fa028e2f5fd044d90e7ef0e7a2fd742eda0f9313ebd2da08f7e7f7389dfa4bd7b47b6c310899f28e3e1af4a06b18ae0f472dbccb198617e623511eab25db01c376ebaf51568122f3c14188fcef23ed54ea1916f74653be4d858bada0882196131cc1f5fad60f2e9166f58ec4fd86dd90663a8f6f8b48350309f9445f58bb5dc3c7229a97858d6ccd26", @typed={0x8, 0x33, @u32=0xcb}, @generic="58af318df1999ab3eff13ddd764d7ab5bd7b46f0a27d06d1392d0c8170d83ad943458173cac6c1da5099a70349c288bae41e860e828adec78096629e383773564fcbe87fdcc1a24e0b828a7557b2902fe4659009f1d66ffc9ca3f18e4507140bf7abdfda99cad8733bdd68d14ea1ac60fa6b5faec67e41d8184eff8863cf7dd109f753c3a30c1f5a7bb3501da9216953b35ec92664ed6642ac38ca93b8616319b64ee2c432ad1f0f81608b0afe98347e84697df54fc76c6115b930fec110e661e4b69283231ba6bfaea868dfad08e1b3df21d302b2163f51ac0fb917ec485c1e6312656438daa08c8e6a", @generic="0ead443543ea7aa847aa0879c560036c3b2ff51196d2b5de886adf3ae3bf2504a16ee3d6a25cb1f690b8608b848afd5e3d0fab6d1a9e204dee758d78c4174ea131eef20c8e63a04282032f0e", @generic="e787", @generic="2202724517cc81cad0d8a9dbee3efba0539d9f57d47d44a17d4c46a402142e41ebc24c537ed20de112becef6d91e2970b1ee5e6e0ebf61573d828adb4851c1e62650bacb38e4c34a99882316946b69d8100674a327f4703aba5a6e39"]}, @typed={0x8, 0x38, @pid=r11}, @generic="ef590ae042c365f81f5d34e5ee5c6799ba78f8ddf7cb3159923e7db2f8895e59e46c93b72f919188b15fc6a4417eae2af8877d1f4747eb9e9df732e0e8c8371222ad91f4a5b913a651c3796ab9d21f36076166589800899bb92144f5371e19ffeabccff47fb033f93044b0b242f7056db67873ec8a8f6fb915f0f3ec010c314aab045bdd5e00d6adc82147e59147ad6a522bc2dd1988bc7a9fc4826edfef378b4827fbde5491ff6096cac702d997abd2e08f39f2876d36df5bc2931fb8d2a987db65c959500b3aee932fa730b2616ef124b9242fe90ffbfe41cb4d640336e0", @nested={0xc8, 0x4b, [@generic="5b8aeabb35c190e3364676fff3c530b120caf50733221646427c2feab8dabe1115185833c3f1ba8823e3537da0cdc96efee146e8c7c64881f63ab6101a31e1f50dfb830181b21c8779b211ab45e1a65a8130f8f4dd77515d74e361f380b532565995f99e171ad6555bb104271a9fb0505cade93d3c9d2c5629d2b9adbab99a7a322b561cd5ac830dd875b42d599bd8de4c91662118d86f688eb23d369e29d101384f0b651f97afe4dffb6aec6b76d5142ff529c68a98e4fb726de6924e1c7d0b", @typed={0x4, 0x6c}]}, @typed={0x4, 0x44}, @generic="dcb900a2cb25ed47a829533fe7c8cf523c35609522bff0d192673b275ff7e19900285377726059e2e079ea112bca35325513af99868a0ed360e7b7b38a177d3f0bd4b434f837f3f66e69c5148910fd77a8b5ea3341c8e5b14f2897e245abbb2357a5b750a32c0e178013badbfd01a9a355f88979655c128827c0af6d234c65a04fe021a4fe8a0132e35e90c2f949244cc437a394ad0b7d0673e1359d74691f3afce5354a0950d7f6152534209eeb064cf8182c2ab4b575ba1816c4080745b60a", @nested={0x2ac, 0x95, [@generic="d53c2103e221184378414541d885b57d92bd394e7ee9c849fd92f94b530b6d6f2e073ec20137d07d", @typed={0x8, 0xa, @uid=r12}, @generic="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", @typed={0x8, 0x79, @pid=r13}, @generic="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", @generic, @typed={0x8, 0x79, @u32=0x5}, @typed={0x14, 0x2f, @ipv6=@mcast1}, @generic="907a309b150677b28e950478165c7b3ee4e7580955bdebe5b61780e7575bbbd7882c0cef1c1932a23804f0bc028c36690060b66754878bbfe1f8c3d886c87ea1b7fc4cd2eb56372dbd75822507816f5616147a12b042862109"]}, @generic="5b31d1186460325233c358bc5f72ab440c6f845346525a28ce3bcf1c7de4a3417fb78ec1b8a76d4adfd42734981ad2ec4285d35eefec29b49abcc1", @generic="b21329e029ed5a176c0234af3ee7e79dcd01b39d9995d7be447b56d0257d8f31d8b6e474c669f6565a7c7db6b215eebe13d7cf1d740aaf08747616a8b726f45e"]}, 0x8ec}], 0x6, &(0x7f0000003700)=[@rights={0x38, 0x1, 0x1, [r1, r2, r0, r2, r2, r2, r2, r1, r1, r0]}, @rights={0x20, 0x1, 0x1, [r2, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}], 0xb8, 0x4000050}, 0x40001) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000003800)=0x0) io_submit(r23, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) [ 457.883620] attempt to access beyond end of device [ 457.900289] loop5: rw=4096, want=2036888240641, limit=264192 [ 457.923537] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 457.937140] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 457.969198] XFS (loop5): empty log check failed [ 457.975062] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r0}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xffffff9e}, 0x0) [ 457.979079] XFS (loop5): log mount/recovery failed: error -5 [ 457.994095] XFS (loop5): log mount failed [ 458.001742] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x0, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fffffff, 0x8000) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000002c0)={'nat\x00', 0x0, 0x3, 0x6a, [], 0xa, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/106}, &(0x7f0000000340)=0x78) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 458.120707] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3d00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 458.191060] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xf0ffffffffffff}, 0x0) [ 458.325899] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 458.350686] XFS (loop5): Mounting V4 Filesystem [ 458.385777] attempt to access beyond end of device [ 458.403265] loop5: rw=4096, want=2036888240641, limit=264192 09:48:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 458.427355] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 458.436740] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 458.492801] XFS (loop5): empty log check failed 09:48:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x700000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 458.513657] XFS (loop5): log mount/recovery failed: error -5 [ 458.529200] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 458.546365] XFS (loop5): log mount failed 09:48:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xc001000000000000}, 0x0) 09:48:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 458.677427] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 458.698124] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 458.733119] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x9effffff00000000}, 0x0) [ 458.932506] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 458.945111] XFS (loop5): Mounting V4 Filesystem [ 458.945367] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 458.965826] attempt to access beyond end of device [ 458.971126] loop5: rw=4096, want=2036888240641, limit=264192 [ 458.986870] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 459.020813] XFS (loop5): empty log check failed [ 459.027874] XFS (loop5): log mount/recovery failed: error -5 09:48:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000005000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xffffff7f00000000}, 0x0) [ 459.034612] XFS (loop5): log mount failed 09:48:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 459.111651] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 459.208114] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 459.273616] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000001305}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 459.349888] XFS (loop5): Mounting V4 Filesystem [ 459.384971] attempt to access beyond end of device [ 459.407890] loop5: rw=4096, want=2036888240641, limit=264192 [ 459.433527] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x1000000}, 0x0) [ 459.455089] XFS (loop5): empty log check failed [ 459.455212] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 459.465592] XFS (loop5): log mount/recovery failed: error -5 09:48:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) 09:48:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1900000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 459.515628] XFS (loop5): log mount failed [ 459.525965] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 459.546953] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x8100}, 0x0) 09:48:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 459.724422] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 459.844359] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2300000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 459.897688] net_ratelimit: 23 callbacks suppressed [ 459.897700] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 459.920108] XFS (loop5): Mounting V4 Filesystem [ 459.947745] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 459.957667] attempt to access beyond end of device [ 459.970837] loop5: rw=4096, want=2036888240641, limit=264192 09:48:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) pselect6(0x40, &(0x7f0000000000)={0x7fff, 0x3, 0x8, 0x9, 0x8000, 0xffffffff00000001, 0x100000001, 0xd51}, &(0x7f00000000c0)={0x1, 0x6, 0x6, 0x6, 0x1, 0x7, 0x3, 0x5}, &(0x7f0000000100)={0xffffffff, 0x7, 0x3, 0x3, 0x45, 0x0, 0xa1, 0x8000}, &(0x7f00000001c0), &(0x7f0000000240)={&(0x7f0000000200)={0x100000001}, 0x8}) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3300000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 460.000481] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 460.016918] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 460.037105] XFS (loop5): empty log check failed 09:48:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xf0}, 0x0) [ 460.058723] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 460.083005] XFS (loop5): log mount/recovery failed: error -5 [ 460.098760] XFS (loop5): log mount failed [ 460.134258] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 460.170194] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 460.232470] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 460.271268] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 460.281355] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x0, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) rt_sigsuspend(&(0x7f0000000000)={0x5}, 0x8) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) socketpair(0x5, 0x0, 0x1316, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) r4 = getgid() write$FUSE_ATTR(r2, &(0x7f00000001c0)={0x78, 0x0, 0x6, {0x400, 0x818, 0x0, {0x3, 0x400, 0x8, 0x8000, 0x2, 0x4, 0x8000, 0x800, 0x5, 0x10001, 0x40, r3, r4, 0x1f, 0x8}}}, 0x78) 09:48:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xfffffffffffff000}, 0x0) 09:48:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180), 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180), 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x310, 0x70bd2d, 0x25dfdbfd, {{@in=@remote, 0x4d5, 0x32}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x8001, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x4e24, 0x5, 0xa, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 460.502365] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 460.515020] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 460.537385] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000007}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 460.581481] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 460.603799] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 460.622388] XFS (loop5): Mounting V4 Filesystem [ 460.651134] attempt to access beyond end of device [ 460.663036] loop5: rw=4096, want=2036888240641, limit=264192 09:48:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x2}, 0x0) 09:48:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") [ 460.698142] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 460.756086] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 460.764214] XFS (loop5): empty log check failed [ 460.782692] XFS (loop5): log mount/recovery failed: error -5 [ 460.809463] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 460.819872] XFS (loop5): log mount failed [ 460.843822] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000002000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 460.961685] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 461.050913] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 461.145859] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x0, 0x0, 0x20, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x8100000000000000}, 0x0) 09:48:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x200000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:26 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r3, 0xf25, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) close(r2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000002c0)=[@in6={0xa, 0x4e22, 0x1, @remote, 0x5}], 0x1c) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) [ 461.479583] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 461.500617] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 461.513969] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x401) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000100), &(0x7f00000003c0), &(0x7f0000000140)="c21216be0654e77f98f556ab98069b9b5493b47834a8b3cfa095d32961610080e7741d39db6acb2edb2a3b29705c6cc27fbd224a157b6ec14a64cfe427015fa4cf788f4b69f71bdb38acc71f436510b741b90388d979e9ee19a6ba9bbbb292c0cf8e3831a6f4641e7e187072f2cbba3b88b8b0409466077e938038da76f6799df8") 09:48:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000008100}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 461.533163] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 461.542633] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 461.567719] XFS (loop5): Mounting V4 Filesystem 09:48:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xfffff000}, 0x0) [ 461.627723] attempt to access beyond end of device 09:48:27 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = dup3(r0, r1, 0x80000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x56, "07923cc895e3b3af082f2d49ab6f33900bed7b45187a66e334b76dc5fe7d74d4ce70e3e855efbd1c53122e48792b3b3749a93b8ab2d5c56fbdf455b6b57223112ba7b3c48db3c13017e610f978d0d8b9726340c88896"}, &(0x7f0000000240)=0x5e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="2600001f4b07ac6aed0535552344e82d1f6bb1c4344f86e3233aa3462b90746ab1dc1d9150548dc121ecb3563ca37438aba1ec3b278c880a4fa3054d6834169bfb69b643987e0de4ed8ba6a8b9c629a0a73e12994422fe96203625d51e7691ff627e149a49181f56df55c037ea527f5c1c62dcccd4d518f4f7275c3938029b1508dc9b5511b74a0ed5f3e2bbc0ec43064275f649a9bb5480ff67d058a4d489774ec1ec5f82a2fa457e25839c93a2880bdbd441f07c20"], &(0x7f00000003c0)=0x2e) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x80000000}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000002c0)={r6, @in={{0x2, 0x4e23, @rand_addr=0x6}}, 0x854, 0x6}, 0x90) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x4, 0x0, 0x1, 0xe38}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000380)={0x6, r7}) io_setup(0x1, &(0x7f0000000080)=0x0) socket$l2tp(0x18, 0x1, 0x1) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) [ 461.650104] loop5: rw=4096, want=2036888240641, limit=264192 [ 461.711574] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 461.727219] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 461.766990] XFS (loop5): empty log check failed [ 461.800553] XFS (loop5): log mount/recovery failed: error -5 [ 461.817918] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000fffffffe}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 461.847336] XFS (loop5): log mount failed [ 461.852349] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xc0010000}, 0x0) 09:48:27 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$describe(0x6, r3, &(0x7f0000000200)=""/49, 0x31) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mountstats\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x3, 0xfff, 0x0, 0x7, 0x88}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000380)={r5, 0x5, 0x7}, 0x8) r6 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x10001, 0x20000) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x106, 0x0, 0x0, 0x0, r6}]) [ 461.998934] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 462.053616] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 462.080508] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000020000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xf000}, 0x0) 09:48:27 executing program 0 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000001c0)={0x65f, 0x1, 0x8, {r1, r2+30000000}, 0x8, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000002c0)={0x7, 0xfff, 0x8, {0x0, 0x1c9c380}, 0x2, 0x9}) close(r3) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000140), 0x2000072e}]) [ 462.298049] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 462.342449] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3e00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 462.395633] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 462.407032] XFS (loop5): Mounting V4 Filesystem 09:48:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400004, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xc001}, 0x0) [ 462.451839] attempt to access beyond end of device [ 462.462664] loop5: rw=4096, want=2036888240641, limit=264192 [ 462.501262] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 462.519775] XFS (loop5): empty log check failed [ 462.534514] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 462.544936] XFS (loop5): log mount/recovery failed: error -5 09:48:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/175, &(0x7f0000000000)=0xaf) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) [ 462.564781] XFS (loop5): log mount failed 09:48:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x20d2d000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 462.588637] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 462.619614] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x1c0}, 0x0) 09:48:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x706000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 462.866248] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 462.913110] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 462.934886] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 462.963525] XFS (loop5): Mounting V4 Filesystem 09:48:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xfffffff0}, 0x0) [ 463.007449] attempt to access beyond end of device [ 463.016398] loop5: rw=4096, want=2036888240641, limit=264192 [ 463.038988] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x2092d000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 463.080982] XFS (loop5): empty log check failed [ 463.095258] XFS (loop5): log mount/recovery failed: error -5 [ 463.115405] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 463.126811] XFS (loop5): log mount failed 09:48:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000003}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 463.145740] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @multicast1}, 0x200}}, 0x4, 0x5262, 0x0, 0x3ff, 0x16}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={r3, 0xf88e}, &(0x7f0000000300)=0x8) [ 463.189120] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400a00, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x100000000000000}, 0x0) [ 463.310197] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 463.376998] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000005}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x404000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 463.430281] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xf0ffffff00000000}, 0x0) [ 463.550153] XFS (loop5): Mounting V4 Filesystem [ 463.566642] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 463.581036] attempt to access beyond end of device [ 463.600708] loop5: rw=4096, want=2036888240641, limit=264192 [ 463.606731] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 463.643591] XFS (loop5): empty log check failed [ 463.654948] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 463.675679] XFS (loop5): log mount/recovery failed: error -5 09:48:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x401e00, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1200000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 463.696093] XFS (loop5): log mount failed [ 463.703441] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0xf0ffffff}, 0x0) 09:48:29 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x480, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000200)={0x1, 0x101, 0x1}) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) pipe2(&(0x7f0000000100), 0x84800) 09:48:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 463.820003] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 463.904581] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000ffffffc3}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 463.982802] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x2000000}, 0x0) 09:48:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x40000a, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x4100, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000000c0)={{0x0, 0x3, 0x80, 0x1, 0xffffffffffffff80}, 0x1f, 0xffffffffffa5a630, 0x8}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)) 09:48:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xc001}, 0x0) [ 464.133163] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 464.145094] XFS (loop5): Mounting V4 Filesystem [ 464.175522] attempt to access beyond end of device [ 464.185350] loop5: rw=4096, want=2036888240641, limit=264192 [ 464.213984] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 464.248635] XFS (loop5): empty log check failed 09:48:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1e00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 464.278035] XFS (loop5): log mount/recovery failed: error -5 [ 464.294789] XFS (loop5): log mount failed 09:48:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xffffff9e}, 0x0) 09:48:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400002, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f00000000c0)) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 464.405761] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1f00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 464.571261] XFS (loop5): Mounting V4 Filesystem [ 464.591717] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 464.612957] attempt to access beyond end of device [ 464.618194] loop5: rw=4096, want=2036888240641, limit=264192 09:48:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 09:48:30 executing program 4: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'bridge0\x00', 0x3}, 0x18) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) r4 = perf_event_open(&(0x7f00000003c0)={0x8c4817fe7099c4ba, 0x70, 0x1, 0x20, 0x4, 0x800000, 0x0, 0x229e06d4, 0xd1008, 0xd, 0x401, 0x0, 0xfffffffffffffff8, 0x0, 0x7, 0xfff, 0x3, 0x9, 0x80, 0x5, 0x7, 0x100000001, 0xffffffff, 0x800, 0x6, 0xdb, 0x1, 0x3, 0x53, 0x4, 0xf99, 0x492e, 0xbc9, 0x4, 0x5, 0x5, 0x8, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x41b, 0xd6ea}, 0x3, 0x8, 0xc79, 0x1, 0x8, 0x73ae, 0x101}, r3, 0x4, r2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x3, 0x24001) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r7, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x4e23, 0x8, @loopback, 0x2f7}, {0xa, 0x4e22, 0x9, @loopback, 0x3}, 0x8, [0x2, 0x10000, 0x101, 0x8d5, 0x6, 0x2, 0x0, 0x4]}, 0x5c) close(r6) io_setup(0x1, &(0x7f0000000080)=0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f00000004c0)=0x1) prctl$setendian(0x14, 0x3) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/65, 0x41}, {&(0x7f0000000300)}], 0x2, 0x0, 0x0, 0x5}, 0x100) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r6, &(0x7f0000000140), 0x2000072e}]) [ 464.639701] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x401f00, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 464.744376] XFS (loop5): empty log check failed 09:48:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x1c0}, 0x0) 09:48:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000003000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xc001000000000000}, 0x0) [ 464.775117] XFS (loop5): log mount/recovery failed: error -5 [ 464.810543] XFS (loop5): log mount failed 09:48:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x7fffdf6d2000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x9c09587328154fad, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x1, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 09:48:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x7ffffffff000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 464.961378] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 465.175950] XFS (loop5): Mounting V4 Filesystem [ 465.182435] attempt to access beyond end of device [ 465.187489] loop5: rw=4096, want=2036888240641, limit=264192 [ 465.193880] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 465.210200] XFS (loop5): empty log check failed 09:48:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x507000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000008000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 09:48:30 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_init1(0x800) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r4, 0x7}}, 0x10) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000200)={'ip_vti0\x00', {0x2, 0x4e24, @broadcast}}) [ 465.220691] XFS (loop5): log mount/recovery failed: error -5 [ 465.231019] XFS (loop5): log mount failed 09:48:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 465.326005] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x40001e, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 09:48:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000000000f0}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 465.512261] XFS (loop5): Mounting V4 Filesystem [ 465.530183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 465.541684] attempt to access beyond end of device 09:48:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x81000000}, 0x0) [ 465.568031] loop5: rw=4096, want=2036888240641, limit=264192 [ 465.587809] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4100000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 465.620048] XFS (loop5): empty log check failed [ 465.634241] XFS (loop5): log mount/recovery failed: error -5 [ 465.654767] XFS (loop5): log mount failed 09:48:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xf000}, 0x0) [ 465.746833] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x4, 0x8972, 0xffffffffffffffff, 0x0) 09:48:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3700000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 466.014470] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 466.050129] XFS (loop5): Mounting V4 Filesystem [ 466.067419] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 466.075240] attempt to access beyond end of device [ 466.082279] loop5: rw=4096, want=2036888240641, limit=264192 [ 466.088224] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 466.106781] XFS (loop5): empty log check failed [ 466.123168] XFS (loop5): log mount/recovery failed: error -5 [ 466.136816] XFS (loop5): log mount failed 09:48:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7fff, 0x94000) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x1, r3, 0x8000000000000}) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xf0}, 0x0) 09:48:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1e) 09:48:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2d00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xd0922000000000) 09:48:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x480000000c000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 466.315145] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x8100}, 0x0) [ 466.416578] XFS (loop5): Mounting V4 Filesystem [ 466.468578] attempt to access beyond end of device [ 466.477512] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 466.497020] loop5: rw=4096, want=2036888240641, limit=264192 [ 466.505274] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 466.525739] XFS (loop5): empty log check failed 09:48:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x100000000000000}, 0x0) 09:48:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) fstat(r0, &(0x7f00000000c0)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000000)) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 466.552452] XFS (loop5): log mount/recovery failed: error -5 [ 466.579709] XFS (loop5): log mount failed 09:48:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x480000003f000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x200000000000000) 09:48:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xfffff000}, 0x0) [ 466.769927] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xd09220) 09:48:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x30, 0x3, 0x0, {0x2, 0xf, 0x0, '/dev/vhost-net\x00'}}, 0x30) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xf0ffffff}, 0x0) 09:48:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 466.939870] XFS (loop5): Mounting V4 Filesystem [ 466.991699] attempt to access beyond end of device 09:48:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000513}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 467.013667] loop5: rw=4096, want=2036888240641, limit=264192 [ 467.019489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 467.048553] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 467.059515] XFS (loop5): empty log check failed [ 467.068978] XFS (loop5): log mount/recovery failed: error -5 [ 467.085779] XFS (loop5): log mount failed [ 467.136560] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x400000) 09:48:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x1000000}, 0x0) 09:48:32 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200c00, 0x40) getpeername$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) connect$can_bcm(r3, &(0x7f0000000240)={0x1d, r4}, 0x10) 09:48:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000ffffff9e}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xffffffff00000000) 09:48:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x9effffff}, 0x0) [ 467.427859] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 467.496778] XFS (loop5): Mounting V4 Filesystem 09:48:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000060000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 467.530036] attempt to access beyond end of device 09:48:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x800) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x1}]) 09:48:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1e00000000000000) [ 467.571095] loop5: rw=4096, want=2036888240641, limit=264192 09:48:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x2}, 0x0) [ 467.635892] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 467.681454] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 467.707899] XFS (loop5): empty log check failed [ 467.728702] XFS (loop5): log mount/recovery failed: error -5 [ 467.741232] XFS (loop5): log mount failed [ 467.761647] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xa000000) 09:48:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xfffffff0}, 0x0) 09:48:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000001000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x200000000000000}, 0x0) 09:48:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x40000) [ 468.085968] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 468.116261] XFS (loop5): Mounting V4 Filesystem 09:48:33 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) 09:48:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 468.149512] attempt to access beyond end of device [ 468.156908] loop5: rw=4096, want=2036888240641, limit=264192 [ 468.168555] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x8100000000000000}, 0x0) [ 468.245678] XFS (loop5): empty log check failed [ 468.296206] XFS (loop5): log mount/recovery failed: error -5 [ 468.329030] XFS (loop5): log mount failed [ 468.359129] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 09:48:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x4000) 09:48:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x400000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 468.573338] XFS (loop5): Mounting V4 Filesystem [ 468.579454] attempt to access beyond end of device [ 468.584459] loop5: rw=4096, want=2036888240641, limit=264192 [ 468.590418] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 468.600210] XFS (loop5): empty log check failed [ 468.604891] XFS (loop5): log mount/recovery failed: error -5 [ 468.611404] XFS (loop5): log mount failed 09:48:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xc0010000}, 0x0) 09:48:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 468.714620] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0xe00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 468.965143] XFS (loop5): Mounting V4 Filesystem [ 468.992094] attempt to access beyond end of device [ 469.000574] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 469.008703] loop5: rw=4096, want=2036888240641, limit=264192 [ 469.014888] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 469.037290] XFS (loop5): empty log check failed [ 469.047896] XFS (loop5): log mount/recovery failed: error -5 [ 469.056428] XFS (loop5): log mount failed 09:48:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r0}) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000001c0)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000002c0)={0x4, {{0x2, 0x4e22}}}, 0x88) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) 09:48:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x40000000) 09:48:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0xf0ffff}, 0x0) 09:48:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x480000000000000a}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 469.252157] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x4000000000000000) 09:48:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 09:48:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000040000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 469.378212] XFS (loop5): Mounting V4 Filesystem [ 469.417954] attempt to access beyond end of device [ 469.422305] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 469.428703] loop5: rw=4096, want=2036888240641, limit=264192 [ 469.455344] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/200, 0xc8) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x400000000000) [ 469.465525] XFS (loop5): empty log check failed [ 469.470441] XFS (loop5): log mount/recovery failed: error -5 [ 469.477087] XFS (loop5): log mount failed [ 469.481875] net_ratelimit: 18 callbacks suppressed [ 469.481891] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1000000) [ 469.565463] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 469.602755] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 469.630656] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000c00}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x8100000000000000}, 0x0) 09:48:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 469.750154] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 469.784627] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xa00) [ 469.813814] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 469.875583] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 469.891308] XFS (loop5): Mounting V4 Filesystem [ 469.897026] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 469.927569] attempt to access beyond end of device [ 469.933654] loop5: rw=4096, want=2036888240641, limit=264192 [ 469.958770] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 469.980279] XFS (loop5): empty log check failed [ 469.997460] XFS (loop5): log mount/recovery failed: error -5 [ 470.009499] XFS (loop5): log mount failed 09:48:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 09:48:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000f0ffff}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x4) 09:48:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0xfffffffffffffffb, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f00000002c0)="d4b45f1355d51c002751b9092c66faf6ac7c8992e800ee31a8fc1f07dc7e285361e67ef484f426f47fb206b2c88df15434c10ee389d056079913f7e28b1816b49d5025b8302748e4f3a0b258965f5800b9a82f749ea1be97eb041de11625030356cf27a1e6d951ee75e14c84aaaa282864d332ab5df82f2afc3ec9ab6b412fed9d19edb1664ae531f37626146d7e200e378a9dff58c9308289e486649fd9b4e2bf5898579b38652ac9f2f9421438bf74cffcbbf9573338edcaa54a9a4392dfdfb0105d0e369e83814b906a7f10b7ac2e8bc98f71403493e0c6668429ab1ba0b6af6044e561f919b1ea4ce34c94", 0xe2}]) 09:48:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1f00) [ 470.181944] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 470.194686] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 470.220407] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x2092d000) [ 470.239627] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 470.259614] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 470.302852] XFS (loop5): Mounting V4 Filesystem 09:48:35 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x65, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)) socket$l2tp(0x18, 0x1, 0x1) [ 470.327705] attempt to access beyond end of device [ 470.332720] loop5: rw=4096, want=2036888240641, limit=264192 09:48:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) [ 470.390458] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 470.391486] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 470.416750] XFS (loop5): empty log check failed [ 470.434502] XFS (loop5): log mount/recovery failed: error -5 [ 470.456200] XFS (loop5): log mount failed 09:48:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0xfffffdfe}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x2) 09:48:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x4000000000000) [ 470.626528] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 470.644363] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x100000000, 0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000300)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000380)={{0x2, 0x5, 0x8, 0x3, 'syz1\x00', 0x7}, 0x2, 0x2, 0x2, r3, 0x3, 0x41, 'syz0\x00', &(0x7f0000000340)=['/dev/vhost-net\x00', 'selinuxcpuset\x00', '\x00'], 0x1e, [], [0x75e6, 0x0, 0xac, 0x100000001]}) io_setup(0x1, &(0x7f0000000080)=0x0) socketpair(0x1, 0x6, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f0000000200)={0x0}) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0\x00') ioctl$DRM_IOCTL_GET_CTX(r5, 0xc0086423, &(0x7f00000001c0)={r6, 0x1}) accept4(r5, 0x0, &(0x7f00000002c0), 0x80800) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 470.719461] XFS (loop5): Mounting V4 Filesystem [ 470.726312] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 470.748210] attempt to access beyond end of device [ 470.755781] loop5: rw=4096, want=2036888240641, limit=264192 [ 470.774006] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 470.786265] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0xf00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 470.810698] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 470.838732] XFS (loop5): empty log check failed [ 470.853975] XFS (loop5): log mount/recovery failed: error -5 [ 470.888220] XFS (loop5): log mount failed 09:48:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x8000000000000000) 09:48:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 09:48:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x100000400100006, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x100000000000005, &(0x7f0000000000)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 471.012841] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2000000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 471.095356] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x2000000) [ 471.132224] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 471.175336] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 471.187539] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 471.261421] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 471.319750] XFS (loop5): Mounting V4 Filesystem [ 471.331990] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x1000000000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='security\x00', 0x1) bind$bt_sco(r0, &(0x7f00000000c0)={0x1f, {0x1, 0x1, 0x7, 0x4, 0x4}}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 471.374130] attempt to access beyond end of device [ 471.379562] loop5: rw=4096, want=2036888240641, limit=264192 [ 471.392461] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 471.406989] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 09:48:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2600000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 471.450508] XFS (loop5): empty log check failed [ 471.455328] XFS (loop5): log mount/recovery failed: error -5 [ 471.464594] XFS (loop5): log mount failed 09:48:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x800100) [ 471.517270] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 471.548335] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 471.563360] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 09:48:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2a00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xa) 09:48:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 471.734182] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 471.760397] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 471.813241] XFS (loop5): Mounting V4 Filesystem 09:48:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) [ 471.839335] attempt to access beyond end of device [ 471.856678] loop5: rw=4096, want=2036888240641, limit=264192 [ 471.870885] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 471.892870] XFS (loop5): empty log check failed [ 471.904809] XFS (loop5): log mount/recovery failed: error -5 [ 471.936097] XFS (loop5): log mount failed 09:48:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0xffc99a3b00000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x18000) [ 471.965634] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x100) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f00000000c0)=""/27) [ 472.053347] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 472.130578] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000fffffff0}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 472.261776] XFS (loop5): Mounting V4 Filesystem [ 472.280393] attempt to access beyond end of device [ 472.305797] loop5: rw=4096, want=2036888240641, limit=264192 09:48:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1f00000000000000) [ 472.366440] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x280000, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000000c0)) [ 472.409455] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 472.435552] XFS (loop5): empty log check failed [ 472.453938] XFS (loop5): log mount/recovery failed: error -5 [ 472.455221] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 472.471452] XFS (loop5): log mount failed 09:48:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x480000009effffff}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 472.525743] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x100000000000000) 09:48:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x0, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0010000}, 0x0) [ 472.679540] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 472.729998] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 472.753366] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 472.834778] XFS (loop5): Mounting V4 Filesystem [ 472.853104] attempt to access beyond end of device [ 472.858522] loop5: rw=4096, want=2036888240641, limit=264192 [ 472.864584] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 472.875828] XFS (loop5): empty log check failed [ 472.883330] XFS (loop5): log mount/recovery failed: error -5 [ 472.896634] XFS (loop5): log mount failed 09:48:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x80010000000000) 09:48:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x300000000000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000c3ffffff}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 09:48:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x0, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 473.028036] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xa00000000000000) [ 473.071541] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 473.106772] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2500000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:38 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = dup3(r0, r0, 0x80000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000000)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x81, &(0x7f0000000080)=0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000240)) rt_sigtimedwait(&(0x7f00000000c0)={0x3f}, &(0x7f0000000100), &(0x7f0000000200)={r4, r5+30000000}, 0x8) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x20) 09:48:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 473.175394] XFS (loop5): Mounting V4 Filesystem [ 473.181947] attempt to access beyond end of device [ 473.187302] loop5: rw=4096, want=2036888240641, limit=264192 [ 473.214961] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 473.268223] XFS (loop5): empty log check failed [ 473.303894] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 473.316516] XFS (loop5): log mount/recovery failed: error -5 [ 473.332642] XFS (loop5): log mount failed 09:48:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1e000000) [ 473.364995] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1700000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x0, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 473.446723] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xc001}, 0x0) [ 473.560241] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x1000000000000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1000000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 473.647127] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 473.697655] XFS (loop5): Mounting V4 Filesystem [ 473.700258] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 473.723875] attempt to access beyond end of device [ 473.737159] loop5: rw=4096, want=2036888240641, limit=264192 09:48:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x2}, 0x0) 09:48:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1f000000) [ 473.756455] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 473.774918] XFS (loop5): empty log check failed [ 473.789981] XFS (loop5): log mount/recovery failed: error -5 [ 473.803335] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 473.817070] XFS (loop5): log mount failed [ 473.858872] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1c00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 473.905274] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 474.044984] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 474.082429] XFS (loop5): Mounting V4 Filesystem [ 474.104553] attempt to access beyond end of device [ 474.113534] loop5: rw=4096, want=2036888240641, limit=264192 [ 474.120971] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 474.150425] XFS (loop5): empty log check failed [ 474.155929] XFS (loop5): log mount/recovery failed: error -5 [ 474.162455] XFS (loop5): log mount failed 09:48:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x3, 0x4) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r2, &(0x7f0000000280)={0x1, {&(0x7f00000001c0)=""/159, 0x9f, &(0x7f0000000100)=""/31, 0x1, 0x3}}, 0x68) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000380)={0xa, 0x4, 0xfa00, {r3}}, 0xc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) 09:48:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x1e00) 09:48:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xc001000000000000}, 0x0) 09:48:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000002}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0xfefdffff}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "116ea478db06816e5a02523326c2e8641ae5"}, 0x13, 0x2) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 474.338907] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 474.378055] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000feffffff}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 474.414649] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 474.438009] XFS (loop5): Mounting V4 Filesystem 09:48:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 474.465634] attempt to access beyond end of device [ 474.477240] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 474.488054] loop5: rw=4096, want=2036888240641, limit=264192 [ 474.510144] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x800, 0x0) fdatasync(r0) io_setup(0x400000000001, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) 09:48:40 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x40) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x90}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80200, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x8e4) 09:48:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000004000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 474.581427] XFS (loop5): empty log check failed [ 474.619935] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 474.641065] XFS (loop5): log mount/recovery failed: error -5 [ 474.657120] net_ratelimit: 22 callbacks suppressed [ 474.657132] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 474.678104] XFS (loop5): log mount failed [ 474.690208] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 474.708742] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 474.719081] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1b00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 09:48:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x40111, 0xffffffffffffffff, 0x0) [ 474.955414] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 475.001217] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 475.023716] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 475.041333] XFS (loop5): Mounting V4 Filesystem [ 475.057260] attempt to access beyond end of device [ 475.066661] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 475.075951] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 475.092472] loop5: rw=4096, want=2036888240641, limit=264192 [ 475.105488] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x3}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='/dev/vcs#\x00', 0x3) write$FUSE_POLL(r0, &(0x7f0000000140)={0x18, 0x0, 0x5, {0x9}}, 0x18) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x8000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xe575}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x8}, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) 09:48:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x100000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x8100}, 0x0) [ 475.164483] XFS (loop5): empty log check failed [ 475.174934] XFS (loop5): log mount/recovery failed: error -5 [ 475.181410] XFS (loop5): log mount failed [ 475.250533] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 475.296539] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 475.349660] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 475.398610] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000003f00}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000080)) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000040)={0x5, 0x59}) [ 475.487206] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 475.547293] XFS (loop5): Mounting V4 Filesystem [ 475.573996] attempt to access beyond end of device [ 475.582416] loop5: rw=4096, want=2036888240641, limit=264192 [ 475.598374] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 475.609608] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) [ 475.629447] XFS (loop5): empty log check failed [ 475.646709] XFS (loop5): log mount/recovery failed: error -5 [ 475.686952] XFS (loop5): log mount failed 09:48:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x3, 0x438, [0x0, 0x20000640, 0x20000670, 0x200007f8], 0x0, &(0x7f0000000340), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x9, 0x0, 0xf7, 'bond_slave_1\x00', 'veth1_to_team\x00', 'team_slave_1\x00', 'ifb0\x00', @dev={[], 0x20}, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0xc}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0xa0, 0x120, 0x158, [@m802_3={'802_3\x00', 0x8, {{0xdc, 0x1, 0x2, 0x2}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"87eded43ffc79b9ed2c7e097da464243d1c452a7e89ce5d4299fb6efb409"}}, @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffd}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0x93b8fea82875a43d}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x19, 0x5, 0x8808, 'team_slave_1\x00', 'bridge_slave_1\x00', 'tunl0\x00', 'erspan0\x00', @random="464296b8b0a7", [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x1b}, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x3ff, 0x7ff, 0x101}}}}, {{{0x13, 0x42, 0x88bd, 'veth1_to_bond\x00', 'team_slave_1\x00', 'ip6gre0\x00', 'gretap0\x00', @random="3ee616e47c0c", [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0x138, 0x168}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x1000, 0x7, 0x3, 0x0, 0x0, "77dbcb4b4e7d7ef587984cc08337e0380916742673efbe4a530aafdc028530fe1e3da48d56df65c78babadbb0213bf63a916ddd43a85328619956da4c17927aa"}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}]}, 0x4b0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x4000) ioctl$TIOCSCTTY(r2, 0x540e, 0x40) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000000)={0x53, 0x0, 0x6, 0x0, @buffer={0x209, 0xb8, &(0x7f00000001c0)=""/184}, &(0x7f0000000480)="ad40657ed56c", &(0x7f0000000400)=""/128, 0x1, 0xfffffffffffffffc, 0xffffffffffffffff, &(0x7f0000000040)}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x8000, 0x0) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000300), &(0x7f00000003c0)=0x4) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r6, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f00000001c0)="7486f97239512e2d3d40e297292e17e6a4d9c2fdc7378fbefbecd4f80096209ac5205e4eb5c2844ca62041d1dd90dd23808ad2269286f1bfa9a497bbc776a468e0068674162e0887b92f086646c91e4c42ecd512bad7cfb1d13c27ab57539cf2ebaefeb8dba7ecddaff74cdaa6a6ab2953ee9de75b9ca28e03610c", 0x7b, 0x2, 0x0, 0x3}]) 09:48:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3400000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 475.753237] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 475.786282] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 475.828960] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 475.834276] kernel msg: ebtables bug: please report to author: bad policy [ 475.847935] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 475.900792] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 475.938975] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 475.939741] kernel msg: ebtables bug: please report to author: bad policy 09:48:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x9}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x58) 09:48:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x1c0}, 0x0) 09:48:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000002000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000100)={0x9, 0x9}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 476.092763] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 476.119684] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 476.189536] XFS (loop5): Mounting V4 Filesystem [ 476.196145] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:41 executing program 0: r0 = msgget$private(0x0, 0x4) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000040)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000080)) msgget$private(0x0, 0x0) [ 476.229792] attempt to access beyond end of device [ 476.245392] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 476.258962] loop5: rw=4096, want=2036888240641, limit=264192 09:48:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000300}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 476.275656] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 476.301054] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 476.337780] XFS (loop5): empty log check failed 09:48:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 09:48:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40040, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f00000001c0)=""/248) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x400800) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x2cf4af3e, 0x1, 0x0, 0x2, 0x8002, 0x2, 0x6}, &(0x7f0000000140)=0xffffffffffffff8c) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) 09:48:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000002c0)={{0x9, 0x9, 0x8, 0xffffffffffffff0c}, 'syz1\x00', 0x40}) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1784, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7ffffffffffd, 0x656b, r0, &(0x7f0000000140), 0x2000072e, 0x0, 0x0, 0x4000}]) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8080, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x400) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0xa0800, &(0x7f0000000640)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d1a616b89a10af8a2fa248ab3a8667ff1ea03a4bda0e71ffbcd7818267c7897fa72f72877c6c9ed1754675bdf8392496167871df0af709bc509ba6515581631e81c67597662580644351dbfee99fb8708745a0010a2382f5342a7234c1336ae466f60b495c7c1130101b515960f6054e24c6455ec9fb5607f2689eadd9902", @ANYRESHEX=r3, @ANYBLOB="2c772a66e746782c31680aed20332959b46fb028ddff9a3d646e6f3d377fea65ca06cdd6d791f2f25a0558bc93e77006d17064c00677f3617c2a9fb35bef2f36edf8bf4bd6df56893816f862f6335ce4896303644cbdf8537584455e4ef50c789a88f239cea0157490962bbc617237761679c434b955245dd24fe34b1a21d521d739c7968ddee3dc100000000000", @ANYRESHEX=r0, @ANYBLOB=',privport,version=9p2000.u,aname=,mmap,cache=mmap,aname=/dev/vhost-net\x00,noextend,fsmagic=0x000000000000ffff,fsmagic=0x0000000000000006,obj_type=/dev/vhost-net\x00,context=unconfined_u,fsname=,mask=MAY_WRITE,fowner=', @ANYRESDEC=r4, @ANYBLOB="2e736d61636b66736861743d2f6465762f76686f73742d6e6574002c61756469742c646f6e745f686173682c00ce7132d3963695e05266ca67e65405f8bc49138415713d2061afa3d4e1ba581f23862e1df2e51086b68dc5a600c3fcb605db76b99084d2752d436afc5782d1c1"]) [ 476.365023] XFS (loop5): log mount/recovery failed: error -5 [ 476.405099] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 476.425548] XFS (loop5): log mount failed [ 476.463399] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000700}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 476.507349] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 476.653797] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0xfffffffffffffabd, @mcast2, 0x9}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={r1, 0x9f, "4e7e996870d87cb5c3dbe528c2f75f7483bdfe6ce4d30fc791609e88bd9497ebc4e864497c8fcc89be957d911a9eebf2f91c02e626efbd3dcb96e541453cbc4385990567f3c075fa492be8c8f78c183fdb41e1e0680e0f1b71e80524ec91c7f2e6b8e03605b8b26718d8dbcef22766af86dd2a4f02765a80d618e240ba2e2a248076e173ec845d8239dadc234754da8c694bebbb56d2d6926b06c621666975"}, &(0x7f00000001c0)=0xa7) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1000, 0x800, 0x4, 0x0, 0x0, 0x8001, 0x10000, 0x1, 0x5, 0x7ff, 0x1, 0x3, 0x8, 0x5, 0x79cf, 0x5, 0x5, 0x6, 0x2, 0x4, 0xcba, 0xd64, 0xffffffff, 0x4, 0x8001, 0x100, 0x8, 0x4, 0x368, 0x3e, 0x316, 0xb31, 0xf1, 0xe4b0, 0x7ff, 0x6, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000200), 0x4}, 0x10000, 0x40, 0x0, 0x2, 0xfd6, 0x7, 0x8e}, r2, 0x3, 0xffffffffffffff9c, 0x9) 09:48:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 09:48:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x2b00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x3000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 476.900056] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 476.936898] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80480, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000080)) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, r0, 0x0) [ 476.959382] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4600000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 477.007304] XFS (loop5): Mounting V4 Filesystem 09:48:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x0, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 477.050608] attempt to access beyond end of device [ 477.060896] loop5: rw=4096, want=2036888240641, limit=264192 [ 477.088627] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 477.120733] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 477.155171] XFS (loop5): empty log check failed 09:48:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x401, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)="22f7776c616e3000", 0x0) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0xfbe, 0x8, "50ef1ba14298ca89ae8a0a3d76c68dcde3c84104812819cd07fca64d03ac0e72c89af622ed48c11948f386521e7d155b82e9c7e2064855874cd53825c797c6", 0x22}, 0x60) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xffffffffffff6f72}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x6}, 0x8) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 477.177906] XFS (loop5): log mount/recovery failed: error -5 [ 477.206186] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 477.210753] XFS (loop5): log mount failed 09:48:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000006}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 477.243246] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:42 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x14000, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)=0x7) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x24000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000001c0)=0x14) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x2) io_setup(0x1, &(0x7f0000000080)=0x0) openat$vhci(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhci\x00', 0x208400, 0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 477.439873] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 09:48:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x9000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:43 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1, 0x30, 0x686c, 0x1}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r1, @ANYBLOB="290561830b7d42e385ca8860000000c0af566cd600000000000000000301e964769d92df6a7179bfe59254f4fbc86123b5b319e9641e7939e6947615905127380b0a633461f81cec770567c5b5d8990fe6d330821ab7549fbf7bab4c41c501ae4ee2c3b8f7d457280e98b7c4b0c24445395c69504da843adf5423000fb34a75d541a60745f093d47d6cc47834d5ebce2b8aa6b129bd8f56fc0bb6d6247b78e438b997050b19b0e756aecc3d5ee5fac078fddf476d4dd03c38a405860fcee2a4becc7afe2938c758d92308def4ea2cb"], &(0x7f00000000c0)=0x31) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000240)=0x5) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000100)={0x40, 0x7fff, 0xeb1c, 0x0, 0x0, [], [], [], 0x0, 0x39df}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000280)={'filter\x00', 0x9e, "c79f1e38707f7ba333176b6559d2f246a7580c97fad21f391084c4c5bfcb62a9f952e46f1ca13e5806c4cdc76085511bc865c6d550a255fd528e75d116aeee3ef10465dd7bb0a2536093dcc0cf94dd37810e404c9f188e3a5eb9653dd99010a14054e4e0f26de35cdba2274f4312b5ae023ebe47e97c6d28c83cff368da65b027eeb58f81b7231e881ee69149f1d8c4adc5205bddcf14f00f7de965536af"}, &(0x7f0000000380)=0xc2) 09:48:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x48000000ffffff7f}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:43 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) close(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181283, 0x14) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x0, @empty, 'syzkaller0\x00'}}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100), &(0x7f00000001c0)=0x4) io_setup(0x1, &(0x7f0000000080)=0x0) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x2, @dev={[], 0x15}, 'lo\x00'}}) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) [ 477.626188] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 477.684444] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000093c000/0x1000)=nil, 0x1000, 0x2, 0x8973, r0, 0x0) [ 477.730344] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 477.747096] XFS (loop5): Mounting V4 Filesystem [ 477.768722] attempt to access beyond end of device 09:48:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000600}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 477.779745] loop5: rw=4096, want=2036888240641, limit=264192 [ 477.798047] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x7fff) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x9) 09:48:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 477.842777] XFS (loop5): empty log check failed [ 477.853623] XFS (loop5): log mount/recovery failed: error -5 [ 477.876950] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 477.877162] XFS (loop5): log mount failed [ 477.922943] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:43 executing program 0: r0 = socket$inet(0x2, 0x2, 0x968) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000ac1414aa000000000800000000000000000000007f000001ac1414aaac1414aae0000001ffffffff00000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000c00000/0x4000)=nil, 0x4000, 0x100000d, 0x8972, 0xffffffffffffffff, 0x0) 09:48:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 477.982559] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x300}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000006000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x10000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000040)={0x6, 0x1, 'client0\x00', 0xffffffff80000002, "0498aef04907e5dc", "ab1565164d2198393a8a9bdd88cbd6d1de4cf5271a582ae84164333446481456", 0x4, 0x8}) 09:48:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x202000, 0x0) write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x1, 0x4, 0x6}, 0x45921e61}}, 0x18) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 478.133495] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 478.164224] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 478.183079] XFS (loop5): Mounting V4 Filesystem [ 478.198376] attempt to access beyond end of device [ 478.213529] loop5: rw=4096, want=2036888240641, limit=264192 09:48:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x48000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000040)={0x3, 0x6, 0x80, 'queue0\x00', 0x5}) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000100)={&(0x7f0000c54000/0x1000)=nil, 0xfffffffffffffffb, 0xa7b72cfac378e29a, 0xaa, &(0x7f0000a44000/0x1000)=nil, 0x1f}) 09:48:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 478.233381] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 478.250546] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 478.253523] XFS (loop5): empty log check failed [ 478.262243] XFS (loop5): log mount/recovery failed: error -5 [ 478.279392] XFS (loop5): log mount failed 09:48:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1d00000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'veth0_to_bond\x00', 0x1000}) [ 478.371192] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000100)='/dev/vhost-net\x00', 0x1) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000001c0)={0x17000, &(0x7f00000000c0), 0xb, r3, 0x9}) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 478.431857] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 478.485575] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x2, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 478.615057] XFS (loop5): Mounting V4 Filesystem [ 478.625106] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 478.635840] attempt to access beyond end of device [ 478.642395] loop5: rw=4096, want=2036888240641, limit=264192 [ 478.657445] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 478.667988] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 478.690376] XFS (loop5): empty log check failed [ 478.702287] XFS (loop5): log mount/recovery failed: error -5 09:48:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x10}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x1300000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10, 0x80800) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='&\\$posix_acl_access\x00') 09:48:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 478.718477] XFS (loop5): log mount failed 09:48:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) fcntl$setown(r0, 0x8, r2) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) r4 = memfd_create(&(0x7f00000000c0)='trusted\x00', 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) personality(0x510000b) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0xfffffffffffffffe, 0x6, "e49525361c8f20044376368a502226f1cedb8be048aa0a4a06427e4aa5003657ecd0fab3e199af47da63f843104f2e9cb2494f4008daa81d289b1f2b0c3e712694dc8ff517abf289846cdd4e88b0d831b641f0a1fe1dd76193321999ad8b57c4d1b43012d1feae62cfaf58908d54e72cf09672bd14cca8cc55ab97a036103836a150e8ba6e4dd308dcc17f9c93b39c20f9031efd4bf6404b895d38dbc3072f59a772d0093e5d6ed7109040d19541c2cda31bc55f9b8a8a98682584b690e723989dbb4062f639f0426effc88d5912cc217c5d3c8af210017814190810f7be17e3efb3957bf33241b6fb6478425a73fdbf60211ac905e602330d96766d76412322", 0x91, 0x3, 0x1, 0x0, 0x7af, 0x6, 0xfffffffffffffe01}, r5}}, 0x120) [ 478.781986] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 478.873437] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4000000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 478.946006] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0xff, 0x8000, 0x9390, 0x7, 0x0}, &(0x7f00000000c0)=0x10) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@md5={0x1, "bbeec4dff27951816dbf6ea5801425c2"}, 0x11, 0x2) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x5}, &(0x7f0000000140)=0x8) 09:48:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x2, &(0x7f0000000000)) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) [ 479.086308] XFS (loop5): Mounting V4 Filesystem [ 479.101206] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 479.125982] attempt to access beyond end of device [ 479.153010] loop5: rw=4096, want=2036888240641, limit=264192 [ 479.172536] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 479.191184] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x500000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 479.202632] XFS (loop5): empty log check failed [ 479.218623] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 479.233481] XFS (loop5): log mount/recovery failed: error -5 [ 479.247384] XFS (loop5): log mount failed 09:48:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 479.351839] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 479.460015] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 479.487768] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x3b9ac9ff}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000004}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:45 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffffe00, 0x20003) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)=ANY=[@ANYBLOB="ff010000000000000a004e24680b0000fe8000000000000000000000000000aa030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000050000000a004e205c3e0000ff02000000000000000000000000000102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2307000000ff01000000000000000000000000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000000fe8000000000000000000000000000bb02000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e20d200000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e24d912704c000000000000000000000000000000000100008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x310) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x20) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000380)={"f1287f262a760d86b54cd44bb9681a25ed7166d6e78833da2ff8e5785aa7ee68a7d9279c2f090e23bc61bda6d625e0bf61fda9349ba83db8fcfb57cb4daac94a2fcd62e789feaafc66271a77d9b56b27123ea74815c5b97d6c903eccdbd898fdafc1b0a61a58cf68a71372a26a07a5b1732d2797ed647483fe717ee9a04f8d3768bd523b6e7a246d8f0f9ba24494e0629d3f10ada6ee24bf25af96c2ae121e637359949fcbbc44d987896e14026031f987df47c7c762f8290ec8fc55b85a30860b2dd0678cdad3a620200d56fa8eec109c8e6c47f88951bf2baea6be0b4c98a7284edba2710c5cbf2c5d2fdf064a0eb96a5b92ce857666bb56050a466a8eed1c9149ff0096d3f33a1139a3c77f4ca4cb9d5edb945f1c7e8d4c6d2109adc78e1cd55f618bae42c43b97a374bfdbe789bfb6953375cb895e596dbb202f79752d77dab91a9e27dc3fa9d03b497dea2ed59b09386544d5543969711d19e0dcacedce20ba36070f0b77a4493dcb6631ac205b62b608b41c8f24e81e680d64da6ebc8df6907bae3b6c27e63fec365ddc1aa00ea4282cf8bc83a0e754d2a208f815ca6dd8385e326dd0f1414e5182bf4d8200674bd7e73c4fe4333c3a0c3799d126de1fc90e2245d97bacda3348e318dee34d620be12f1a8d2bcb5dbfc8850a83862e61623079ded16b40da02ce8a3ec83de84141f9910a1f7fc0cb162fcad0d3e10152e997e6645aa7cbb14c3735d3301d9a39f67dffc9f5b4f78ceb10e83bd34c60c579a2617d3965ef57ec2b744624aa6fdf733ec30421ab26d3013fbff532123c360f68d33123ada0cd61ae24eafc98ad349f4b82ddea9731865b45f8fe6261d3c6c4895f90bbe3daefb54569d348f6d2da4086901d8f43e6a69c2fb6250e1f15c7348a5237bd2ab3e049db0fe389bb2d1e8a9fc41656782524e296b88407a564cfdc070fb5f66780070f6f4a7bbd643ddcab808174f7264e5ed18c1d5e98e57faf29fb7e01951f4dda50acaea2a077d8514df0a510aa4effab4cb23183676c1bb61f5e1d9e95b2985a6c5b6aca9e64e8cba073de1fccf52a668998913851e7a05c9bd5985cc6635948558443cc3005da8932305fadc652d1da7a498ced2e60a3a667c7e58ba4c85a18adf866e2c9bf5cfc53e5ea5a068b251b0593ea8092bc52972d4ee134107e6b5230301ec63f41cba692a23758a78a68f7d36bf48f78e9b53e7e9f4c19b1ded243c0fe0c784a072d70259f1dbeac3970275cd74f179ad713a739a1113f5f537e7d4a11ee920c97decc5d68ff1ec11c83209c690a8859b73208d8a43eecf39622f55f2b13a3b2dd416e08424ce50930d0f22529502728aa325d97e28791806eca979b9cf34e0bb840e26531b09a91b9076b435e1089105d04cee2c89fe17cd1343e9882100e9d087bc0df4b56d9213699ed2d0e6363e069d1c1"}) 09:48:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)="62e8ff0100") close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)) 09:48:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 479.665421] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 479.699393] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 479.715061] net_ratelimit: 22 callbacks suppressed [ 479.715117] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 479.739900] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 479.757018] XFS (loop5): Mounting V4 Filesystem 09:48:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3000000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 479.764032] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 479.804400] attempt to access beyond end of device 09:48:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 479.820045] loop5: rw=4096, want=2036888240641, limit=264192 [ 479.852781] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$pppoe(0x18, 0x1, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000240)={0xffff, 0xfffffffffffffffe, 0x1f}) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000000c0)=0x404) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000100)=0xba, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x8003, 0x100) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) write$P9_RSETATTR(r0, &(0x7f0000000040)={0xffffffffffffff02, 0x1b, 0xfffffffffffffffe}, 0xfc) [ 479.884129] XFS (loop5): empty log check failed [ 479.900651] XFS (loop5): log mount/recovery failed: error -5 [ 479.912607] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 479.919792] XFS (loop5): log mount failed [ 479.968835] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x3200000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 480.006065] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 480.073401] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 480.115174] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 480.147763] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 480.175284] XFS (loop5): Mounting V4 Filesystem [ 480.183481] attempt to access beyond end of device [ 480.204857] loop5: rw=4096, want=2036888240641, limit=264192 [ 480.213696] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x900000000000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:45 executing program 0: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xf8, 0x74e074e8, 0x400, 0x2}, {0x9, 0x8000, 0x100000000, 0x81}, {0x4, 0x8, 0x9, 0x5}]}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0xa2) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000100)={r3, r0, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:45 executing program 4: membarrier(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x300000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 480.224277] XFS (loop5): empty log check failed [ 480.238914] XFS (loop5): log mount/recovery failed: error -5 [ 480.250987] XFS (loop5): log mount failed 09:48:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 480.335565] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000007000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 480.388120] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 480.415346] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0xcd14, 0x102) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000200)={0x1ff, 0x6, 0x800}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast1, @multicast1, 0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000100)={@local, 0x72, r5}) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 480.523488] XFS (loop5): Mounting V4 Filesystem [ 480.548134] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 480.567790] attempt to access beyond end of device 09:48:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x101000, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x8) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 480.585875] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 480.601295] loop5: rw=4096, want=2036888240641, limit=264192 [ 480.618462] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 480.637742] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 480.640159] XFS (loop5): empty log check failed [ 480.654068] XFS (loop5): log mount/recovery failed: error -5 [ 480.667492] XFS (loop5): log mount failed 09:48:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x6}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 480.718182] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 480.727745] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000001, 0x103000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x81, @mcast2, 0x9}}, [0x8, 0x2, 0x3, 0x4, 0x40, 0x6, 0x4, 0x1, 0xffffffffffffff24, 0x0, 0x1ff, 0x7, 0xe816, 0xaead, 0x3]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x1}, &(0x7f0000000300)=0x8) r3 = dup3(r0, r0, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0xfefdffff00000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x0, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 480.828085] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 480.876121] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2, 0x0) 09:48:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 480.993083] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 481.015502] XFS (loop5): Mounting V4 Filesystem 09:48:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/230, 0xe6}, {&(0x7f0000000000)=""/14, 0xe}, {&(0x7f00000001c0)=""/46, 0x2e}, {&(0x7f00000003c0)=""/241, 0xf1}, {&(0x7f0000000200)=""/42, 0x2a}], 0x5, &(0x7f0000000540)=""/184, 0xb8, 0x9}, 0x40000061) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000780)={@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x4, 0x4, 0x1, {0xa, 0x4e23, 0x9, @mcast2, 0x1}}}, {&(0x7f0000000640)=""/237, 0xed}, &(0x7f0000000740), 0x2}, 0xa0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) r4 = semget$private(0x0, 0x0, 0x0) semctl$SETVAL(r4, 0x7, 0x10, &(0x7f0000000840)=0x8) [ 481.048131] attempt to access beyond end of device [ 481.049393] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 481.065047] loop5: rw=4096, want=2036888240641, limit=264192 [ 481.082201] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x1305000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 481.113919] XFS (loop5): empty log check failed [ 481.122434] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 481.146614] XFS (loop5): log mount/recovery failed: error -5 [ 481.177615] XFS (loop5): log mount failed [ 481.200091] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 481.252160] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. 09:48:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x103000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x0, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000000)={0x0, 0x9}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) getresuid(&(0x7f0000000100), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) getresgid(&(0x7f0000000240), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) fchownat(r2, &(0x7f00000000c0)='./file0\x00', r4, r5, 0x800) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 481.369018] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x3000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 481.653293] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 481.667024] XFS (loop5): Mounting V4 Filesystem [ 481.688413] attempt to access beyond end of device [ 481.698512] loop5: rw=4096, want=2036888240641, limit=264192 [ 481.715540] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 481.717206] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x10000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:47 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x2000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x4}, 0x5}}, 0x5, 0x7}, &(0x7f0000000080)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e23, 0x4, @empty, 0x8}}}, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1511}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c0000001a001586b728941f4a0200000000000000000a10000000120000000000006d4a1bd2965f4d7afb67a028b888bcbb2953e691d2a06a7fd68918683b210d7790a28b742f33f60f58fda23e4a99afb6d518f8a8fbd1ad6c5ff93e99fb69486e1b9eef9d96ccf0ce47bdac506d5f065fe0eb5a22a49d0b67f99296297b8b1f12"], 0x1c}}, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000200)={&(0x7f000093b000/0x3000)=nil, 0x3000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000340)) 09:48:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x5000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 481.756560] XFS (loop5): empty log check failed [ 481.770311] XFS (loop5): log mount/recovery failed: error -5 [ 481.782186] XFS (loop5): log mount failed 09:48:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() getgroups(0x3, &(0x7f0000000480)=[0xffffffffffffffff, 0xee01, 0x0]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) getgroups(0xa, &(0x7f00000005c0)=[0xee00, 0x0, 0xee01, 0xee00, 0x0, 0xee01, 0xee00, 0xee01, 0xee00, 0xffffffffffffffff]) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r2, @ANYBLOB="02000700", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="040001000000000008000200", @ANYRES32=r5, @ANYBLOB="ee47c37be99d659014842d947f406f687bf4c282e16a6f29c65fb505e5d6c6915535efd1066af6efb4a7a33b3b3f2755be26925a3e331c727907b59075bd62947453eb486e75beabd2437416de2ad4047156637d1c0c89e109d4125d75272042dbb2560c467325e1c14b9fe8c649e2447f600b503edc4daeaf9154796f76cffbb2e972e3523d081bd15e21a5c9cf2ea6f6b99a7fea6d273375738dc7bd68977cc747176c4a0328", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000400", @ANYRES32=r9, @ANYBLOB="10000400000000002000040000000000"], 0x64, 0x3) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r10, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) 09:48:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x0, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 481.923352] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 481.957919] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x80001009, 0x8972, 0xffffffffffffffff, 0xffffffffffffffff) 09:48:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:47 executing program 0: r0 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80000) ioctl(r0, 0x1f, &(0x7f0000000040)="660a1ec0766232bf9f231aeceef6e17059e26786a08dbb9f7f7c5d79608b8ec3f528ffb41d2c0de755cd3a1048c2b7eb485cf147be8312e2da") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xffffffffffff34e1, 0x200000) [ 482.137477] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 482.166762] XFS (loop5): Mounting V4 Filesystem 09:48:47 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x10040, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000240)) r5 = open(&(0x7f0000000100)='./file0\x00', 0x200602, 0x40) ioctl$TCFLSH(r5, 0x540b, 0x9) ioctl$TCFLSH(r0, 0x540b, 0x10000) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xb67, 0x4, 0x1}) r6 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100000001, 0x208101) write$FUSE_POLL(r6, &(0x7f00000000c0)={0x18, 0x0, 0x6}, 0x18) [ 482.191029] attempt to access beyond end of device [ 482.218938] loop5: rw=4096, want=2036888240641, limit=264192 [ 482.226850] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 482.255386] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 09:48:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x500000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0xffc99a3b}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xbe, 0x3, 0x8001, "5093d269879c9f2a2b7b410c8d50ee71", "bfe8827a3ac538f908c9cb8d96b93ed6e43281f747dc49d4e7a9bb3924e9dc6f618678197ce1dc2b3462a1806eed5cd7fc19f2549664b8ee4e1082556ec04b3e3e821c52f03693df820759f7f63c905cbd311c93472c3d4ac1ed53b37eeeb5f5193e1526fcbbd50cf38a4789d83b2ed08d4d3a490fdec570762ffc1f65288207f22597655ddbb324dedd0bca0db3842ae7064532fc98fff91fe3c8efbd606f19e11887562575f95361"}, 0xbe, 0x3) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x7bba74e7f7d31db7) [ 482.305719] XFS (loop5): empty log check failed [ 482.314071] XFS (loop5): log mount/recovery failed: error -5 [ 482.330056] XFS (loop5): log mount failed 09:48:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x2, 0x0, 0x0, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 482.420682] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:48:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socket$l2tp(0x18, 0x1, 0x1) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 482.469736] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 482.488800] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0xc000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 482.630247] XFS (loop5): Mounting V4 Filesystem [ 482.642641] attempt to access beyond end of device [ 482.665020] loop5: rw=4096, want=2036888240641, limit=264192 09:48:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x6000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:48 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) [ 482.701784] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 482.723277] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:48 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000400)={'team0\x00', r3}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000300)=0x80000001, 0x4) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r5, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2000072e}]) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101, 0x0) ioctl$TCSBRKP(r6, 0x5425, 0xdd53) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000640)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000200)=0xe0) [ 482.757044] XFS (loop5): empty log check failed [ 482.774363] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 482.789160] XFS (loop5): log mount/recovery failed: error -5 [ 482.819824] XFS (loop5): log mount failed 09:48:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x5}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 483.044230] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 483.105112] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x2}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x900}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000939000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) mmap(&(0x7f0000ad9000/0x2000)=nil, 0x2000, 0x8000100d, 0x1f, 0xffffffffffffffff, 0x0) 09:48:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create1(0x80000) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 09:48:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0xfeffffff00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xffffffffffffffff, 0x0) [ 483.367201] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 483.426437] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 483.442741] XFS (loop5): Mounting V4 Filesystem [ 483.465617] attempt to access beyond end of device 09:48:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)="2f70726f01010000732ff5a999926ded6b3eff00000063007fc1a6dc11deec9c2979ebeb8285f5fa6e085dd2b6a4762bcb665a3e0990cc8a15ddd6355c005083a4ac9030ff5eef71dd9f69fd1dd0200c7f8b2972d61dcf14991927cde21936e358ec1e2089363cf7a2ffd6338b2325a56663e9b090890f21baacb2d4796005d49f456ab698539434d1d7e9d082ae890b5728787c1ee3645ac26cdb5256e3ffca077ebf34aa706b3907e45ac41419f3c2adde", 0x2, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) 09:48:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80001009, 0x8972, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10, 0x80800) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='&\\$posix_acl_access\x00') 09:48:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 483.485994] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 483.487520] loop5: rw=4096, want=2036888240641, limit=264192 [ 483.515412] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 483.590716] XFS (loop5): empty log check failed 09:48:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0xffffff7f}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 483.610991] XFS (loop5): log mount/recovery failed: error -5 [ 483.617697] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 483.636085] XFS (loop5): log mount failed [ 483.706333] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x2}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 483.967188] XFS (loop5): Mounting V4 Filesystem [ 483.980833] attempt to access beyond end of device [ 483.998517] loop5: rw=4096, want=2036888240641, limit=264192 [ 484.021738] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 484.059373] XFS (loop5): empty log check failed [ 484.064557] XFS (loop5): log mount/recovery failed: error -5 [ 484.072206] XFS (loop5): log mount failed 09:48:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, 0xffffffffffffff9c}) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x900000000000000}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:48:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x5, 0x9, 0x7, 0x8, 0x0, 0x6, 0x1}, {0x8, 0x8, 0x7fff, 0x9}, 0x101, 0x6e6bb4, 0x2, 0x0, 0x3, 0x3}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) 09:48:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x3f000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:48:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)=@acquire={0x2e0, 0x17, 0x0, 0x0, 0x25dfdbfd, {{@in=@remote}, @in6=@ipv4={[], [], @broadcast}, {@in6=@dev, @in=@dev, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, {{@in, @in6=@remote, 0x4e23, 0x6}, {0x0, 0x0, 0x9, 0x7}, {0x8, 0x0, 0x0, 0x9}, 0x0, 0x6e6bb4, 0x2}, 0x100000001, 0x1, 0x3, 0x70bd26}, [@lifetime_val={0x24, 0x9, {0x8, 0x0, 0x4, 0x400}}, @policy={0xac, 0x7, {{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e21, 0xffffffffffff5d1b, 0x2, 0xa0, 0xa0, 0x2b, r1}, {0x101, 0x8, 0x401, 0xfffffffffffff800, 0x40, 0x0, 0x13c1, 0x9}, {0x1, 0x7, 0x2, 0x80000000}, 0x9, 0x6e6bb2, 0x2, 0x0, 0x3, 0x1}}, @etimer_thresh={0x8, 0xc, 0x6}, @algo_auth={0x74, 0x1, {{'cmac(blowfish)\x00'}, 0x148, "a49e34e68ab6130bae7522da45b1e96845a2e419af76848b1a9c3395013f1c1d407524740043df9706"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0x34, 0x3d}}, @extra_flags={0x8, 0x18, 0x7}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@loopback, 0xa, 0x6, 0x3}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1}, 0x4800) [ 484.310720] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 484.347538] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it 09:48:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/mnt\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000}, 0x13, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x0}, 0x0) 09:48:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000040)={0x10, 0x4800000000000000, 0x9effffff}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 484.400876] XFS (loop5): Mounting V4 Filesystem [ 484.401309] XFS (loop4): Mounting V4 Filesystem [ 484.406795] attempt to access beyond end of device [ 484.471657] attempt to access beyond end of device [ 484.476455] loop5: rw=4096, want=2036888240641, limit=264192 [ 484.495052] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 484.509700] loop4: rw=4096, want=2036888240641, limit=264192 [ 484.513034] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 484.528088] bond0: tunl0 ether type (768) is different from other slaves (772), can not enslave it [ 484.532223] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 484.549502] XFS (loop5): empty log check failed [ 484.562943] XFS (loop5): log mount/recovery failed: error -5 [ 484.593040] XFS (loop5): log mount failed [ 484.602281] XFS (loop4): empty log check failed [ 484.624914] XFS (loop4): log mount/recovery failed: error -5 [ 484.644808] XFS (loop4): log mount failed [ 636.614350] INFO: task syz-executor0:5605 blocked for more than 140 seconds. [ 636.621729] Not tainted 4.19.0+ #308 [ 636.627403] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 636.635684] syz-executor0 D18472 5605 1 0x00000004 [ 636.641336] Call Trace: [ 636.643943] __schedule+0x8cf/0x21d0 [ 636.653706] ? trace_hardirqs_on_caller+0xc0/0x310 [ 636.658992] ? check_preemption_disabled+0x48/0x280 [ 636.664360] ? __sched_text_start+0x8/0x8 [ 636.668546] ? zap_class+0x640/0x640 [ 636.672282] ? lock_downgrade+0x900/0x900 [ 636.676787] ? check_preemption_disabled+0x48/0x280 [ 636.681826] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 636.687187] ? kasan_check_read+0x11/0x20 [ 636.691352] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 636.697027] ? find_held_lock+0x36/0x1c0 [ 636.701115] schedule+0xfe/0x460 [ 636.704822] ? __mutex_lock+0xafa/0x16f0 [ 636.708897] ? __schedule+0x21d0/0x21d0 [ 636.712892] ? kasan_check_read+0x11/0x20 [ 636.717406] ? do_raw_spin_unlock+0xa7/0x330 [ 636.721827] ? do_raw_spin_trylock+0x270/0x270 [ 636.726748] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 636.732214] ? mutex_destroy+0x200/0x200 [ 636.736635] schedule_preempt_disabled+0x13/0x20 [ 636.741412] __mutex_lock+0xaff/0x16f0 [ 636.745793] ? vfat_lookup+0xf1/0x640 [ 636.749620] ? mutex_trylock+0x2b0/0x2b0 [ 636.753693] ? check_preemption_disabled+0x48/0x280 [ 636.760021] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 636.765363] ? kasan_check_read+0x11/0x20 [ 636.769539] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 636.775148] ? rcu_softirq_qs+0x20/0x20 [ 636.779139] ? trace_hardirqs_off_caller+0x310/0x310 [ 636.784585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.790139] ? d_alloc_parallel+0xb7c/0x1f40 [ 636.794980] ? zap_class+0x640/0x640 [ 636.798718] ? trace_hardirqs_on+0x310/0x310 [ 636.803145] ? __d_lookup_rcu+0xaa0/0xaa0 [ 636.807630] ? zap_class+0x640/0x640 [ 636.811397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.817258] ? zap_class+0x640/0x640 [ 636.821001] ? zap_class+0x640/0x640 [ 636.825041] ? find_held_lock+0x36/0x1c0 [ 636.829127] mutex_lock_nested+0x16/0x20 [ 636.833196] ? mutex_lock_nested+0x16/0x20 [ 636.837760] vfat_lookup+0xf1/0x640 [ 636.841411] ? __lockdep_init_map+0x105/0x590 [ 636.846231] ? vfat_find_form+0x120/0x120 [ 636.850408] ? lockdep_init_map+0x9/0x10 [ 636.854953] ? __init_waitqueue_head+0x9e/0x150 [ 636.859639] ? init_wait_entry+0x1c0/0x1c0 [ 636.863894] ? lock_acquire+0x1ed/0x520 [ 636.868219] __lookup_slow+0x2b5/0x540 [ 636.872119] ? vfs_unlink+0x510/0x510 [ 636.876274] ? path_init+0x1ed0/0x1ed0 [ 636.880180] ? path_init+0x1538/0x1ed0 [ 636.885311] lookup_slow+0x57/0x80 [ 636.888879] walk_component+0x92b/0x2590 [ 636.892954] ? trace_hardirqs_on+0xbd/0x310 [ 636.897618] ? check_preemption_disabled+0x48/0x280 [ 636.902654] ? path_init+0x1538/0x1ed0 [ 636.906858] ? trace_hardirqs_off_caller+0x310/0x310 [ 636.911990] ? pick_link+0xaf0/0xaf0 [ 636.916030] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 636.921060] ? set_root+0x42b/0x810 [ 636.925019] ? vfs_mknod+0x800/0x800 [ 636.928749] ? trace_hardirqs_on+0xbd/0x310 [ 636.933081] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 636.938742] ? path_openat+0x220/0x5150 [ 636.942746] ? trace_hardirqs_off_caller+0x310/0x310 [ 636.949800] ? debug_mutex_init+0x2d/0x60 [ 636.954262] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 636.959299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.965159] ? security_inode_permission+0xd2/0x100 [ 636.970213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.976172] ? vfat_hashi+0x14d/0x390 [ 636.980003] link_path_walk.part.40+0xa61/0x1530 [ 636.985098] ? lookup_open+0x1b90/0x1b90 [ 636.989189] ? walk_component+0x2590/0x2590 [ 636.993526] ? find_held_lock+0x36/0x1c0 [ 636.998024] ? check_preemption_disabled+0x48/0x280 [ 637.003065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.008939] ? percpu_counter_add_batch+0x141/0x190 [ 637.015361] path_openat+0x270/0x5150 [ 637.019201] ? rcu_softirq_qs+0x20/0x20 [ 637.023182] ? unwind_dump+0x190/0x190 [ 637.027505] ? zap_class+0x640/0x640 [ 637.031241] ? path_lookupat.isra.43+0xc00/0xc00 [ 637.036316] ? unwind_get_return_address+0x61/0xa0 [ 637.041265] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 637.046606] ? expand_files.part.8+0x571/0x9a0 [ 637.051214] ? find_held_lock+0x36/0x1c0 [ 637.055610] ? __alloc_fd+0x347/0x6e0 [ 637.059427] ? lock_downgrade+0x900/0x900 [ 637.063578] ? getname+0x19/0x20 [ 637.067286] ? kasan_check_read+0x11/0x20 [ 637.071450] ? do_raw_spin_unlock+0xa7/0x330 [ 637.076181] ? do_raw_spin_trylock+0x270/0x270 [ 637.080793] ? __lock_is_held+0xb5/0x140 [ 637.085170] ? __check_object_size+0xb1/0x782 [ 637.089692] ? _raw_spin_unlock+0x2c/0x50 [ 637.094198] ? __alloc_fd+0x347/0x6e0 [ 637.098032] do_filp_open+0x255/0x380 [ 637.101841] ? may_open_dev+0x100/0x100 [ 637.106240] ? get_unused_fd_flags+0x122/0x1a0 [ 637.110839] ? __alloc_fd+0x6e0/0x6e0 [ 637.114979] do_sys_open+0x568/0x700 [ 637.118715] ? filp_open+0x80/0x80 [ 637.122268] ? trace_hardirqs_off_caller+0x310/0x310 [ 637.127733] __x64_sys_open+0x7e/0xc0 [ 637.131558] do_syscall_64+0x1b9/0x820 [ 637.135780] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 637.141164] ? syscall_return_slowpath+0x5e0/0x5e0 [ 637.147501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.152446] ? trace_hardirqs_on_caller+0x310/0x310 [ 637.157790] ? prepare_exit_to_usermode+0x291/0x3b0 [ 637.162830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.168009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.173212] RIP: 0033:0x455570 [ 637.176742] Code: Bad RIP value. [ 637.180114] RSP: 002b:00007ffe391ffb70 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 637.188146] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000455570 [ 637.195758] RDX: 0000000000000000 RSI: 0000000000090800 RDI: 00000000004bc2ae [ 637.203045] RBP: 0000000000000731 R08: 0000000000000001 R09: 0000000002734940 [ 637.210738] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000004 [ 637.218315] R13: 000000000007611f R14: 00000000000001ee R15: 0000000000000000 [ 637.225950] INFO: task syz-executor0:20046 blocked for more than 140 seconds. [ 637.233227] Not tainted 4.19.0+ #308 [ 637.237800] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 637.246035] syz-executor0 D22240 20046 5605 0x00000004 [ 637.251683] Call Trace: [ 637.254699] __schedule+0x8cf/0x21d0 [ 637.258437] ? __sched_text_start+0x8/0x8 [ 637.262600] ? retint_kernel+0x2d/0x2d [ 637.266865] ? trace_hardirqs_on_caller+0xc0/0x310 [ 637.271813] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 637.277872] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 637.283359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 637.288458] ? retint_kernel+0x2d/0x2d [ 637.292376] schedule+0xfe/0x460 [ 637.296079] ? __schedule+0x21d0/0x21d0 [ 637.300071] ? kasan_check_read+0x11/0x20 [ 637.304552] ? kasan_check_read+0x11/0x20 [ 637.308712] ? do_raw_spin_unlock+0xa7/0x330 [ 637.313128] ? do_raw_spin_trylock+0x270/0x270 [ 637.318074] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 637.323389] d_alloc_parallel+0x1478/0x1f40 [ 637.328062] ? __d_lookup_rcu+0xaa0/0xaa0 [ 637.332235] ? __d_lookup+0x5b8/0x9e0 [ 637.337514] ? wake_up_q+0x100/0x100 [ 637.341253] ? d_alloc_parallel+0x1f40/0x1f40 [ 637.346129] ? retint_kernel+0x2d/0x2d [ 637.350046] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 637.355390] ? d_lookup+0x20d/0x300 [ 637.359034] ? __d_lookup+0x9e0/0x9e0 [ 637.362861] lookup_open+0x560/0x1b90 [ 637.367058] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 637.372991] path_openat+0x2464/0x5150 [ 637.377230] ? rcu_softirq_qs+0x20/0x20 [ 637.381235] ? unwind_dump+0x190/0x190 [ 637.385525] ? path_lookupat.isra.43+0xc00/0xc00 [ 637.390296] ? unwind_get_return_address+0x61/0xa0 [ 637.395564] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 637.400600] ? expand_files.part.8+0x571/0x9a0 [ 637.406477] ? find_held_lock+0x36/0x1c0 [ 637.410568] ? __alloc_fd+0x347/0x6e0 [ 637.414697] ? lock_downgrade+0x900/0x900 [ 637.418858] ? getname+0x19/0x20 [ 637.422243] ? kasan_check_read+0x11/0x20 [ 637.426762] ? do_raw_spin_unlock+0xa7/0x330 [ 637.431187] ? do_raw_spin_trylock+0x270/0x270 [ 637.436090] ? __lock_is_held+0xb5/0x140 [ 637.440166] ? __check_object_size+0xb1/0x782 [ 637.445044] ? _raw_spin_unlock+0x2c/0x50 [ 637.449212] ? __alloc_fd+0x347/0x6e0 [ 637.453031] do_filp_open+0x255/0x380 [ 637.457269] ? may_open_dev+0x100/0x100 [ 637.461259] ? strncpy_from_user+0x411/0x5a0 [ 637.466117] ? digsig_verify+0x1530/0x1530 [ 637.470427] ? get_unused_fd_flags+0x122/0x1a0 [ 637.475331] ? getname_flags+0x26e/0x590 [ 637.479416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 637.485410] do_sys_open+0x568/0x700 [ 637.489142] ? filp_open+0x80/0x80 [ 637.492690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.498595] ? trace_hardirqs_off_caller+0x310/0x310 [ 637.504055] __x64_sys_openat+0x9d/0x100 [ 637.508139] do_syscall_64+0x1b9/0x820 [ 637.512033] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 637.517736] ? syscall_return_slowpath+0x5e0/0x5e0 [ 637.522686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.527892] ? trace_hardirqs_on_caller+0x310/0x310 [ 637.532934] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 637.539203] ? prepare_exit_to_usermode+0x291/0x3b0 [ 637.544585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.549456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.554965] RIP: 0033:0x457569 [ 637.558183] Code: Bad RIP value. [ 637.561555] RSP: 002b:00007f7747c6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 637.569636] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 637.577215] RDX: 0000000000000002 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 637.584825] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 637.592109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7747c6b6d4 [ 637.599699] R13: 00000000004c2e2e R14: 00000000004d4760 R15: 00000000ffffffff [ 637.607416] [ 637.607416] Showing all locks held in the system: [ 637.614084] 1 lock held by khungtaskd/983: [ 637.618322] #0: 00000000276c2a36 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 637.627317] 1 lock held by rsyslogd/5477: [ 637.631469] #0: 0000000076f76b2d (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 637.639773] 2 locks held by getty/5566: [ 637.644082] #0: 000000002c7563d4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 637.652340] #1: 00000000947d1628 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 637.661553] 2 locks held by getty/5567: [ 637.666787] #0: 00000000f378af52 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 637.675340] #1: 00000000f72ced09 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 637.684569] 2 locks held by getty/5568: [ 637.688548] #0: 000000000fbc4c74 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 637.697986] #1: 00000000aa241eac (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 637.707406] 2 locks held by getty/5569: [ 637.711393] #0: 000000004931ef18 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 637.720049] #1: 00000000f2933323 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 637.729225] 2 locks held by getty/5570: [ 637.733205] #0: 00000000dcc7c958 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 637.741908] #1: 00000000e7505b5e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 637.751097] 2 locks held by getty/5571: [ 637.755365] #0: 0000000055873550 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 637.763933] #1: 00000000fcbffef7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 637.772808] 2 locks held by getty/5572: [ 637.777090] #0: 00000000b94bad29 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 637.785661] #1: 00000000938b7504 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 637.795768] 2 locks held by syz-executor0/5605: [ 637.800442] #0: 00000000fa30c57e (&sb->s_type->i_mutex_key#28){++++}, at: lookup_slow+0x49/0x80 [ 637.809705] #1: 000000008fa56478 (&sbi->s_lock){+.+.}, at: vfat_lookup+0xf1/0x640 [ 637.817760] 4 locks held by syz-executor0/20044: [ 637.822529] 2 locks held by syz-executor0/20046: [ 637.827608] #0: 00000000bd61cd6f (sb_writers#22){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 637.835901] #1: 00000000fa30c57e (&sb->s_type->i_mutex_key#28){++++}, at: path_openat+0x2444/0x5150 [ 637.845518] [ 637.847156] ============================================= [ 637.847156] [ 637.854502] NMI backtrace for cpu 1 [ 637.858146] CPU: 1 PID: 983 Comm: khungtaskd Not tainted 4.19.0+ #308 [ 637.864722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.874165] Call Trace: [ 637.876760] dump_stack+0x244/0x39d [ 637.880406] ? dump_stack_print_info.cold.1+0x20/0x20 [ 637.885608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.891161] nmi_cpu_backtrace.cold.1+0x5c/0xa1 [ 637.895841] ? lapic_can_unplug_cpu.cold.26+0x3f/0x3f [ 637.901042] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 637.906336] arch_trigger_cpumask_backtrace+0x14/0x20 [ 637.911535] watchdog+0xb3e/0x1050 [ 637.915095] ? reset_hung_task_detector+0xd0/0xd0 [ 637.919958] ? __kthread_parkme+0xce/0x1a0 [ 637.924203] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 637.929312] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 637.934426] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 637.939016] ? trace_hardirqs_on+0xbd/0x310 [ 637.943342] ? kasan_check_read+0x11/0x20 [ 637.947501] ? __kthread_parkme+0xce/0x1a0 [ 637.951742] ? trace_hardirqs_off_caller+0x310/0x310 [ 637.956851] ? trace_hardirqs_off_caller+0x310/0x310 [ 637.961965] ? lockdep_init_map+0x9/0x10 [ 637.966043] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 637.971153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 637.976695] ? __kthread_parkme+0xfb/0x1a0 [ 637.980946] ? reset_hung_task_detector+0xd0/0xd0 [ 637.985795] kthread+0x35a/0x440 [ 637.989169] ? kthread_stop+0x900/0x900 [ 637.993151] ret_from_fork+0x3a/0x50 [ 637.997052] Sending NMI from CPU 1 to CPUs 0: [ 638.003021] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.236 msecs [ 638.003566] NMI backtrace for cpu 0 [ 638.003573] CPU: 0 PID: 20044 Comm: syz-executor0 Not tainted 4.19.0+ #308 [ 638.003581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.003586] RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x50 [ 638.003600] Code: 65 8b 15 58 b5 82 7e 81 e2 00 01 1f 00 75 2b 8b 90 d0 12 00 00 83 fa 02 75 20 48 8b 88 d8 12 00 00 8b 80 d4 12 00 00 48 8b 11 <48> 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 5d c3 0f 1f 00 55 [ 638.003605] RSP: 0018:ffff88018837ece0 EFLAGS: 00000246 [ 638.003615] RAX: 0000000000040000 RBX: ffffea00069feb80 RCX: ffffc90001e5a000 [ 638.003621] RDX: 000000000003ffff RSI: ffffffff819bd9bb RDI: 0000000000000007 [ 638.003628] RBP: ffff88018837ece0 R08: ffff8801d37a4300 R09: ffffed003b5c5b4f [ 638.003634] R10: 0000000000000004 R11: ffff8801dae2da7b R12: 1ffff1003106fda0 [ 638.003641] R13: ffffea00069feb80 R14: 0000000000000000 R15: ffffea0006af6808 [ 638.003648] FS: 00007f7747c8c700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 638.003654] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 638.003660] CR2: ffffffffff600400 CR3: 00000001c1e6e000 CR4: 00000000001406f0 [ 638.003666] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 638.003673] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 638.003676] Call Trace: [ 638.003680] unlock_page+0x26b/0x4c0 [ 638.003685] ? wake_up_page_bit+0x6f0/0x6f0 [ 638.003690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.003695] ? init_page_buffers+0x433/0x570 [ 638.003700] ? __set_page_dirty_buffers+0x810/0x810 [ 638.003704] ? write_comp_data+0x14/0x70 [ 638.003708] __getblk_gfp+0x88a/0xd50 [ 638.003713] ? __find_get_block+0xf20/0xf20 [ 638.003718] ? check_preemption_disabled+0x48/0x280 [ 638.003722] ? zap_class+0x640/0x640 [ 638.003726] ? zap_class+0x640/0x640 [ 638.003730] __bread_gfp+0x2d/0x310 [ 638.003734] fat__get_entry+0x5a6/0xa40 [ 638.003739] ? perf_trace_sched_process_exec+0x860/0x860 [ 638.003745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.003749] ? __d_lookup_rcu+0x556/0xaa0 [ 638.003754] ? fat_ioctl_filldir+0x560/0x560 [ 638.003758] ? __mutex_lock+0x85e/0x16f0 [ 638.003762] ? vfat_lookup+0xf1/0x640 [ 638.003767] ? d_alloc_parallel+0x8e8/0x1f40 [ 638.003771] fat_search_long+0x33b/0x1570 [ 638.003776] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 638.003780] ? kasan_check_read+0x11/0x20 [ 638.003785] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 638.003790] ? trace_hardirqs_off_caller+0x310/0x310 [ 638.003795] ? fat_parse_short+0x2cc0/0x2cc0 [ 638.003799] ? __d_lookup+0x591/0x9e0 [ 638.003804] ? check_preemption_disabled+0x48/0x280 [ 638.003808] ? __d_lookup_rcu+0xaa0/0xaa0 [ 638.003812] ? __d_lookup+0x5b8/0x9e0 [ 638.003817] ? d_alloc_parallel+0x1f40/0x1f40 [ 638.003821] ? d_lookup+0x255/0x300 [ 638.003825] vfat_find+0x16d/0x1a0 [ 638.003830] vfat_lookup+0x107/0x640 [ 638.003834] ? __lockdep_init_map+0x105/0x590 [ 638.003839] ? vfat_find_form+0x120/0x120 [ 638.003844] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 638.003848] ? d_lookup+0x20d/0x300 [ 638.003852] ? __d_lookup+0x9e0/0x9e0 [ 638.003856] ? vfat_find_form+0x120/0x120 [ 638.003860] lookup_open+0x72e/0x1b90 [ 638.003866] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 638.003870] path_openat+0x2464/0x5150 [ 638.003874] ? rcu_softirq_qs+0x20/0x20 [ 638.003879] ? unwind_dump+0x190/0x190 [ 638.003883] ? path_lookupat.isra.43+0xc00/0xc00 [ 638.003888] ? unwind_get_return_address+0x61/0xa0 [ 638.003893] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 638.003898] ? expand_files.part.8+0x571/0x9a0 [ 638.003902] ? find_held_lock+0x36/0x1c0 [ 638.003906] ? __alloc_fd+0x347/0x6e0 [ 638.003911] ? lock_downgrade+0x900/0x900 [ 638.003920] ? getname+0x19/0x20 [ 638.003925] ? kasan_check_read+0x11/0x20 [ 638.003929] ? do_raw_spin_unlock+0xa7/0x330 [ 638.003934] ? do_raw_spin_trylock+0x270/0x270 [ 638.003938] ? __lock_is_held+0xb5/0x140 [ 638.003943] ? __check_object_size+0xb1/0x782 [ 638.003947] ? _raw_spin_unlock+0x2c/0x50 [ 638.003951] ? __alloc_fd+0x347/0x6e0 [ 638.003956] do_filp_open+0x255/0x380 [ 638.003960] ? may_open_dev+0x100/0x100 [ 638.003964] ? strncpy_from_user+0x411/0x5a0 [ 638.003969] ? digsig_verify+0x1530/0x1530 [ 638.003973] ? get_unused_fd_flags+0x122/0x1a0 [ 638.003978] ? getname_flags+0x26e/0x590 [ 638.003983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.003987] do_sys_open+0x568/0x700 [ 638.003991] ? filp_open+0x80/0x80 [ 638.003996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.004002] ? trace_hardirqs_off_caller+0x310/0x310 [ 638.004006] __x64_sys_openat+0x9d/0x100 [ 638.004010] do_syscall_64+0x1b9/0x820 [ 638.004015] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 638.004020] ? syscall_return_slowpath+0x5e0/0x5e0 [ 638.004025] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.004030] ? trace_hardirqs_on_caller+0x310/0x310 [ 638.004035] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 638.004039] ? prepare_exit_to_usermode+0x291/0x3b0 [ 638.004044] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.004049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.004053] RIP: 0033:0x457569 [ 638.004067] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.004072] RSP: 002b:00007f7747c8bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 638.004083] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 638.004089] RDX: 0000000000000002 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 638.004095] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 638.004102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7747c8c6d4 [ 638.004108] R13: 00000000004c2e2e R14: 00000000004d4760 R15: 00000000ffffffff [ 638.009128] Kernel panic - not syncing: hung_task: blocked tasks [ 638.562871] CPU: 1 PID: 983 Comm: khungtaskd Not tainted 4.19.0+ #308 [ 638.569450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.578801] Call Trace: [ 638.581407] dump_stack+0x244/0x39d [ 638.585044] ? dump_stack_print_info.cold.1+0x20/0x20 [ 638.590253] panic+0x238/0x4e7 [ 638.593455] ? add_taint.cold.5+0x16/0x16 [ 638.597621] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 638.603082] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 638.608539] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 638.613995] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 638.619461] watchdog+0xb4f/0x1050 [ 638.623021] ? reset_hung_task_detector+0xd0/0xd0 [ 638.627878] ? __kthread_parkme+0xce/0x1a0 [ 638.632129] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 638.637239] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 638.642350] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 638.646951] ? trace_hardirqs_on+0xbd/0x310 [ 638.651281] ? kasan_check_read+0x11/0x20 [ 638.655438] ? __kthread_parkme+0xce/0x1a0 [ 638.659684] ? trace_hardirqs_off_caller+0x310/0x310 [ 638.664798] ? trace_hardirqs_off_caller+0x310/0x310 [ 638.669907] ? lockdep_init_map+0x9/0x10 [ 638.673986] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 638.679124] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.684670] ? __kthread_parkme+0xfb/0x1a0 [ 638.688924] ? reset_hung_task_detector+0xd0/0xd0 [ 638.693774] kthread+0x35a/0x440 [ 638.697152] ? kthread_stop+0x900/0x900 [ 638.701134] ret_from_fork+0x3a/0x50 [ 638.705819] Kernel Offset: disabled [ 638.709468] Rebooting in 86400 seconds..