op', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) bind$l2tp6(r0, &(0x7f0000000200)={0xa, 0x0, 0xffffffe0, @remote, 0x7, 0x2}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) recvfrom$inet(r1, &(0x7f00000000c0)=""/240, 0xf0, 0x40002021, &(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6, {0xe}, {0x0, 0x9}, {0x0, 0xd}}}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) [ 647.329126] qfq: no options [ 647.524775] XFS (loop4): Invalid superblock magic number 22:37:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) writev(r2, &(0x7f00000002c0), 0x347) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000080)=0xbc8, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5], 0x28}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r4, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x38, r5, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x7}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x5ad}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x3ff, 0x6}}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000040}, 0x20004090) socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$CHAR_RAW_PBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="4800000028f0270d000000000000010000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 647.574721] XFS (loop5): Invalid superblock magic number [ 647.690862] selinux_nlmsg_perm: 1 callbacks suppressed [ 647.690872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61480 sclass=netlink_route_socket pid=1603 comm=syz-executor.1 [ 647.765249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61480 sclass=netlink_route_socket pid=1605 comm=syz-executor.1 22:37:47 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6c0400703000"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x80000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) write$eventfd(r7, &(0x7f0000000080)=0x8001, 0x8) 22:37:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) prctl$PR_MCE_KILL_GET(0x22) modify_ldt$read_default(0x2, &(0x7f0000000380)=""/185, 0xb9) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r7, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f00000009c0)={0x204, r8, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x68, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xd}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xb40d}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x68}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x174}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x5, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}]}, @TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7fff, @private1={0xfc, 0x1, [], 0x1}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x14}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xff}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xcf}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf3e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x0, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x80}, 0x24000010) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca4803", 0x92, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x48001, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYRESHEX=r6, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 647.996299] XFS (loop0): Invalid superblock magic number [ 648.167586] XFS (loop5): Invalid superblock magic number 22:37:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca4803", 0x92, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:47 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4}, 0x4181}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x10005b) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2242, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000680)=""/55) syz_open_procfs(r0, &(0x7f0000000200)='net/vlan/vlan0\x00') bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000100)=""/141, 0x8d) execve(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000540)=[&(0x7f00000008c0)='let/vlan/v\x02an0\x00\b\xd6#\x82\xda\xd0E\x80\v\x11>\xcc1\x19\x16a\xbcr:?\x05FdB1\x03\xcb\x8f\xc6A+}\xb2\t\xd5r\x99\xa2\xa1*\xa3\xcc\xb0\xd3\xce)\xe3B\xf3=f?9\v\xea\xd5\x89\xfc\xd5\"L\x87t\xc3\xfb\x97\x8bE\xb1y\xd2u_\x91\x12\x1a\xe5h>\xdfn\x84\xe2j\xb8@\xecd\x88N\xb3\x02?\x05\x9b\xb5\xeb\xca\b\r\x99e\xa8\x8ds\xc4\xfe\x90\xecn\x02\x81\xd5\x18:\xa9\x8b\xf2)YVXhK2\xcb\x91\x18\x8c\x8b\xcb\xffJ\xfe?\xddGP\x13\x92^|&\xca8\x10d\xc1\x9eO\x95\x9c9m\xd8L\xbd\xf1x\xd0S\xc669', &(0x7f0000000340)='net/vlan/vlan0\x00', &(0x7f0000000380)='\"5\x00'/13, &(0x7f0000000240)='*#)(-+:\xed#\\#.\\@#\x00', &(0x7f0000000440)=',\x00', &(0x7f0000000480)='net/vlan/vlan0\x00', &(0x7f00000004c0)='/dev/loop', &(0x7f0000000500)='\x00\x00'], &(0x7f0000000640)=[&(0x7f0000000580)='--\x00', &(0x7f0000000840)='\x0e\xc1\xdb\xf2A7\xbc\x16p\x81\xc5\x92z\x1ad\xa9\xfa@\xff$_\xd2\x88\xf5\x14:\xab\x9dZ\xb7\xbc\x14\xc0`\xa5>\x80\x8a\xa0YB)`\xcev\x88?\xa4\\}\xd0\x83N\x9d \x92\xba\xe2F\x9e\x96\xdc\xdd\xdb\xf5k\x8c\xce\x8d|G_p7r\x90\x96\xcb\x06\xe8\xb0\x85\n\xeb\xe9\xadT\x8f\xf0\xb7\x97\xa0,#\xecM\xa2\xff\x84\xa9?\xc7\xd1\xb6', &(0x7f0000000600)='*\xf2']) mount(&(0x7f0000000400)=ANY=[@ANYRESOCT], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)='xfs\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000006c0)=""/199, &(0x7f00000007c0)=0xc7) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:47 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x2, 0x9, 0xa03, 0x0, 0x0, {0x8, 0x0, 0x8}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x80000001}}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x1}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x401}}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0xa}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000001}, 0x801) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9b", 0xaa, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffbf00ff0000060000000000000071"], 0x74}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r7, 0x800455d1, &(0x7f0000000080)) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f0000001ac0)=[{&(0x7f00000002c0)="2fec19c1a33bdf572f6269228873357c9ccdc57638d943953ac8be21b2", 0x1d}, {&(0x7f0000001b80)="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", 0x161}, {&(0x7f00000007c0)="f7bcc18e6a3ed47d121cc0299be75810475c8bb446b3572b30205bf643eb1f7d3a6c6bbd16ae388a67f500bd054e30549ce8d8d3e4fd71edb255034a4c7f3197113a64ad259e4d6702f5e0047668e0dad80af6aa56b7441b72114e7f94e4487b7104e3d22fd23dba5642c681f2d67589d2891b9bbabfc9f722dd98a8339048fa5b5185190bd32d971c34977aac01c293484b75524c58aa042ab3642ab2ea201111f3d124fb2aefdfa862862faf995470b2c93f717c45d99e101d4f7cd095bc22cb5c75b5c56736020c198f4b5fae34453bd40e4863f79ec8f9056edb6cc7c2d6733c7e4750eaa4d2cfd280b1fddade5c037e870ad2b0fcf5d04d868955bcb55c9a38a303aa58a4d48ad48e5fe785fe1bf6df933a3c5ca6651acb928678ab84274a5be823e62f05d6f1a427051f6788d4b2cb8a8167efbabecb6887492908242f9e16fdfcf34d529fdab85967872ac3553065723b1cf4f6642cb0cdf4a753ef65112e1aea4b62d02dec08a49447ad45dee54f7394edba2e2150ec05a5f5d50793b8bfa3dc3ef69e20278547bb30a6c5c4972816fb51e416c2d1e4f2b82daac57ed39b4dc91afd5e68b1f017d391afa75e2cf913f5c1b20a1a323af24301475b0757ba4fc589bce25ccfedc5a6d095a70717863d83eef03e28a0ca05575cb9eaadb58466dd6684ac96dbf4de0d367bae4ee0293f7bc4cc661183716dba6cc796f3ce11abc90b9130e364fefed24e44ecd78a596b56e405c74a38ede644fd44944af2a4fd597e3a4ea17282ef19470ab3834a26215cdf34db5f2c32cea888f4836e9f155936da8a1a8ef8ddc888814b3cd15d2895e3a9d4fb51aa4bf193461e51ba12f1f4dd7af1720881ecd969db006436c29ce3609ea38d004e48ffe87f672b7f4a510d8a432645961750a90bf3262aa37c919287d9afe351762bd0943a613ed6fffbd53b9a9f4c19b7b2e969210d849e88ca45a4815e18d179006facb8da2b186310cc42c7ff6d615df8bce51977d02e9073550a8552b4053a6895f836198f02589da048571b875a5c3745b2581e4d32f82bd6b3351089d749401e90f8578dbf42b24d3aa5b4ac0f740aa11c53c13749bd0e82270fe42f4101b37bce680b67b833000f31bd1a07d464c83846f33289cf1f00ed60501c0348a6e05d5be00ae126c0c86e72468306aa32ade3cb82665187ec271f2be7d680eadb7f661d4437a7d70a002b3f3b4da9862539abd918443a479aa52c303a20568cd4137352145f27ae91aac0ca90a3797fa5754d1f50073cdd4bd5d27479fde410ff9f9ad3131855c8b9798d86d42c4fbe09d09358befdb76e3c7237f230910378c985a690bc107396cda3b49006518c05da1e94b75afdb81168d6a5b9fdf621bd4e629db1ba200a89ed334f93002373db8b8224c59efbde272b6e98f22d6edd593f4ef0725d1e9d20ce46f4f0b093793ac86113af3f9fb5b9b955a70fecb0cede4a674da264afc88f030cd30ce3f240ff2ec65a4c6410137f3e7184fd21fb42a79e6a1f95ffdde03f5385dd53e4fdb3de3c84ee94d78f58c14fff44323ead958a1ca0675093195a209898f02abc18bae4e9da51b562310e3231755610450398e2730b7ea81dac8f2ceb97ffaa6b88c1c90ec32dbb5dc7e372d5b3069ffe6c02a5b1741dd614d376dcf3a40cadff938bdcedc7271c1e50e9b2f04f5c375bcf7df909fb63d9760fb8c9603050b1e3a29a8465a3ee829121463532b00452339451da4eda07131f857d03627560e8df428c380df86d91d8e4c4861b80bb2942e375ea075b165e27ddd2dd2300aa33917987950b29b81180e1bd26ea13ea754ec965f23a380ecb8a6ab819ca85986f0f5a122bd7064c671a34de59025916595e97f87b68c4be9065f4126b1cdfbadb19a9569fdfe31d78b34c10d96b293813646ed4fc1f5b15e6eb644f9a739d39e9e6eabd0a94bdbcbb11cb62172e1bbf000eec59bb9865a9b9c1cae9423240a6142a4cd7fdaaab5171dba77cae2dd8f74fc76ed068aa6c1f0dc53eeea33b43254d2304173553953f9f3c665a630312cff383807e675c54e46c53c528f3b31c8f98850456a233b5d47c1eb157526f8c618ad23a2f6e98d8f503e1b9d0d8dff37a94f6ad13f7509cf9571b5b63c8d835eadae6c4538bd7a7cb81a92dad7e00a8068f5591a17fba9ab3d55cdf4b0f505af3dbc595f1511ab2b97521f3778ac99fa4f1c6dbcf3f11ceef68c9427b20f06f3f95653017608e75b8078825becb8c52ec167dd27383fd8c8a5d8c431b3edab5d1e749f60395edcf567a96516dde205f1ae9a7dda89c5d320b5486a11e09f01aad269ab4c90771e260206bd95a66230227a3f24fec8882f2b10dcad44928b3b63ec80f6df47667ca40514ebce7cf340b2cdc4c7a4d0ded9900f69d1e003ea27f7564fbb88f33d5bbe5d3b99786f3fbf33c8c0b3d656741ad0a479d61f75a690a2cd49c1de6c9aeb15ef228addd42e96e36cd1294033d32c59452cbc42ba58ce6927900f953c46b6d720d2b9137566ce4e2ea6d72a14052ffc4ead293df9ecd5ce0625fd38bab7a1e732ae514a8ab3fa00cd67d5f1a57f409344b966828aa3bcdf2d78518b51d1918e20fed4745de9650571fd8f2682458fc0690ec4dabd94c487c2ffaf2bc7bdf13ebb13a5f213e3f84e96260d08c0fbea5e1d65c537858f10bd568b30cd0e3d46bfe95bf3ebae88f898abc80ace0a10ebd4a7a5549325dbf3a5b863beaca544c40831601dd4066076d915771660cd4598542f49e5e9552f96d1e914a21776c680280ec5becb973dcdc695c4fb8c323f09276f69e1baeb40ebaf34b7865f9fdcceb67cc1186a42a9a101e5720731a917500223999a45b0b1be1bdfe3be3fdaea952d35990b96867e9b234b57e172ea659ab0daf7486f43a683cd8656aebd9fd95376b17b0fa8693ba5cf56566b576be604f9a91db3c671838a12bde10acceb230e90d16046641089db662e885981005b91370fe6a51101e13802b3ee32b7e40cc247eb0bd99cbab8253d7d2c19c71771593e94790866e7299325faef75222a7c1781b02cad4de41f795fc9c44824ce1b2c4d4c8d73b5faa57ce1eefed980c6e16c6c5d29f1314bfb0ab51d858af6ec8e1d69e0f5a1d1b1a1cd855db4e74fcfaa4af00d8460c3cb5b11356c66ef3bed49f7357068d79f5aa8e8a03031019c0340651b3e1cff881d2b7355ee69b64ee7bf07df831a05baf57e1d9d82ec415e9825bb65271f58074901747be0a7989f1ea47aa48707890f80ae75f162f6e0d4a04613f7ec646fa79f02da5c8e4a3cf531baa9f7f0979a754f09de73091834d7f2570be41c23fb97f51876e6e3e7314ea0178c43bd8db300bcdee302f62e1d85d7b732b219c90a1a77c03f56a98b0856cd03f900e50439d38980862b536a54c48eb9589bdce5c3932ae13a509dd0e11a916b1f6c4b16af37f190fea6d82b4f99f66fa94d3c20f1d19f5fbafeef7e155bd656a1d57b11f4bed61072cdb4bca152a4ddbcc88d96e7b5c5a9f053bb5acda83baa085865c2cbe642ec1867c0ad23fd692409e08164548618533194684aff0bacff250cb092a0256410c12bb99d165b93abc7394fa0ee0c2b6c572304994d1e943079dabf0cf8bd26dfd35d8082bf0f659edc796a35d3104d4e750bb66e832313b96d8351ce2f4af88ab21f0404a9ccd2006126b918f1dd2ef00bb3e51049ddef42592f8db679bc59a32456daa2170c393534c1ecc924398f57f23e6ad7a107eb72781da952285db10b9db5bd58489820108aaa8be4bca30f3f5fdc71ceb1c0ba93a2f1b990ac4526a4f3e84198addc4d900be0dc817acfb1ccf71d3f21bc5ff58796b933d131f3b2c7527edd22260958989e8cd144aebf76fb4defe9ce73c8c40e0c414195fddedf58cfeb43207ce824533bb8751310a005cc4bd23c08c1f2188571566e051a4f3b9535208341cbc5fd096b7236a1d3fc106ec5eeb14483f2d9a115b83ee1729fbde8e1a4e7fbe90cc8df30876f1fd0c41848154fc47fbe9c495cd44ce241d53db935eea54cc7fa966378c4aba051564c766bd09088ba53818bd9efe430cec3f75b3c8d8ea0366ee2039ab7803ee5bdc2bdce2f04fe633135b0a3e9cbd965d8a4e7f54965354bbc414e0f6a64820909c7509b581c0fea4d7a42da088b32166a0baceda268e4a696b417b687cf25a538a15d9d9bd7cf72e74de3d9e3c96e8f92379ea4cffd4b5ca794073849b0724dfbb9c3e22e0bf9d578e31d51a973911b28284ffd16915a4e92f2821c99e937153928b009a95dcc244b1e4333bf76df244b0240f46313fd7ba2c851c1d2bd776fd6b99ef694249ea89d921c9eded6843b60aa0c933c7a9b629738c09679934f16973849ae3c9d0fa59424b6c127964a3b0613b020bfe5ecf86d27c0534d55b136d7ed80eaca56e04bd397958885853e5076ca5d47979a3d9f15e72d43032f952edaef53a26f9227ed4503228d65669d37a2e4a2912bbf97bd62a6c48d2d43f1ac7615e35cf0ffd3b86ec00abb82cc32a153f24202ba6c20a9b71f7ab3f0c19433e388fbb89197793e8475f670e605759f61824481f46689e68f1083289bc08292c9118f90d32ad4ec5493068f45e302aa9bacb551a7db54427d98f3980c35584dce37679fd998601c0f5d96351e5379d35a5fcda3f1eaf669f098be5f149c0849e40cdf4811a245a9cb985ff87b069ea9639970f1656146c4a1f63aab2bb02b32fad7955a7316491f2b6b36cce7cb294ce5769119997fcd8c8dc877e289aca96aeb0beffc02ebeebeea85ad41a9bb6acb760382c60b5d98bc01c090f10acc37025c9729232648deb181ff9842fb320117be98c84557478e10fa0dd25304d4866e0bbb2cb7e0e03f5659bbf398da0f95c6ea3f5bd1f24db7ce5ed248df57231d98edda6e22a33316742b42f95a983190582b3ec5893731cde8209800bdf114fb33621f507386e2c9cb1c3fc46ce475265b37a106c9060876813da29270e3c7fc0c71fc481d7db7c5a1ccb0730c134e4bb2497b150a08ce4ef6c027041df43408b274b7fd598bb16dedb7e4629218831b9a8182a19f356cfeed3dd2d099a8fd448a63378baefd6f46bfa7bf57e41ebcdb536b3ac4bbfbcd64dc11ad77d0a61ed0526595803a7755a4189ad0fc376958d0f47d2c00530ff06791773c477fff211b418514fa16eaa9f6364e1e6f7fc78f0797ac592a659db1ab75fa429601d64a58a850083704d256ed2235a0def9f95f0f8c71bbebec9dddd89c7e2a1f40fe8b466db47b1a2628e2899b55e46ace54857394534b11f5bcd0d22c6b5885fc8a3d507b478ee1251b6f2f02eb431576248e5c9e1804b07c232ea03c61e0cce1b0e6219c712b0e07c8d9c0e541485e154d1679500eb3fef2799e517cb1377473ddb7723f4b4523b69171fcc37cb697fa2369d36a44c939e1b005a7ed0e4b0d0e529b15e4bc012384ca0a4953804462168caba7e0272899337a41a1b458ab57541976faa98ac2caae445bd97429a7e286242ff23ab2334972257dcfa4a1492000c371a2c4f14c6411f555aa3339c724b2869dda8edb06066f88316ea82c78c98b3ff2b1f26f41b3ad8be6d0d6d1211f7dcd0f874e2ee111c084afd37aeaad9368a692b9ea8851a7eec88c8cb3221b7bc8fc6956bc6147312573c19e8b6bf6e5659a8b97d03b8c6e384e9b92542bf39b813e9b451f041fc4386ca9701910cda61a4aaaec585944cc915c627509e86589a6f156bd0bcbccfcf04580982fb78a17b5486abf672a6ce6a", 0x1000}, {&(0x7f0000000300)}, {&(0x7f0000000500)="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", 0xfa}, {&(0x7f0000000600)="bfe1422587c4acbff02a24c52937307bc6dd545a72c4a15e9573c5f25f9ca1762557070f399076bbcb53a3a117fef74b63294f9b478d79515777893ca93135e25dccf5438027c57e8b6dddb61bf953cbca4a5e94f95221484649948566e455956cf602327d9408d8727402c914cdadb6059c296124dd3a9c3c8357b27a5a3c837c33c7810fd7957bb4f564f8a1f45608349b1bed8764f42a4d0eff7d2420b5454ec8a66df35e58ee814202d2140f6f5dd59c77be7a87e643c88637aaaaa0d896347db142c2208b49675d1d7cae66d3e1224556356a6afa6848285ed036de2cac0d2bdb62fc28162e56286390ba94672c4a", 0xf1}, {&(0x7f00000017c0)="86e323334bfcfac13e9e6fbe8110e9fb092e188f425b8b81b66e7814a77f4f987e2f7d29c3a8f1074912f055bd86170d6e5b78f24fd66f09792933a208313169b4e43e3b405f9f6cb7dd2647eae982e90a5cf84a0e13475940023bb8ded56d719806d2bcf0313b47d973fa7c97c5f47f5f50331c1f27567b34ecdbf86a24cd4ac46f7edc310cc8ced65d6ab8f8d2c7a8785b6da07598b0fb4b4e63f5f3dd601cdff76317197be9c56755f38def81579396acb7886c970bccb3ec55dfdf02a403d9952c7f5dac3bcf254c4527d666da2a47b978a988", 0xd5}, {&(0x7f00000018c0)="4398e407179423be1dbfd10f24cdc86cb99a55e4489a8b24b9ea1f5c3b1b6839c7e5ea5bd452bbf7bbc7fe35fc911a1c221d1fee1008d385a19d5c96a4b487463f319f4ffe78aaa0aaaaa8c64c59116e3ead0ef6de4436bb67c851b16c580711c7e8b2092029a66f2a28cfb245c388b9726fc5edfea82dab604987b51c83b1b513aa2d157a2a63ea6c2ed840627d727ab76cf3fa9920faf53544c6c2e615f7647e09efc15aeb20664300afc88fe51ab517d563004f723307db3a2a492fd4aedfcdcea9cde2486d0e35f2adc417fed45a2c8130c0c1e921e044a575ee84f63104bebb20bed74e1650e5b7f5fed1011c72b1", 0xf1}, {&(0x7f00000019c0)="d5e1342298e26e9ff35f76509dd2034ac3ffc7fe088255b42ce0f42e4c801c603bdf163395b33b860489c669610fa2898063871388ad156c6b3b988c597c2a38237bc0af5613b58078ff642e2b917bf58a87c74e0d88e0241ddb5f31e618c8d4ccafba6cc135f30f246ad6bfd4118f303c3579a025613099daca283deff494c034fb8ba297405626daa853434dda9b1053347db38e837dd3b11745f0538269af2564256c1885be1a9ceefe29e92f819b7ae9b97824b26e896bd71c41776f5fad48", 0xc1}], 0x9) ioctl$KVM_S390_VCPU_FAULT(r8, 0x4008ae52, &(0x7f00000000c0)=0x9) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newtfilter={0x24, 0x28, 0xd27, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0x2, 0x4}}}, 0x24}, 0x1, 0x0, 0x0, 0x4c081}, 0x20000800) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6, {0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x40094}, 0x0) 22:37:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000020000020000286574680000320000000073fda8286711513f5057139a2046f1303cfa3e1855f7ecae74029378559b30975d73ce2a37c8b2dd0852b7ded53f970b0bb8bb37c3b613b87bca8ab65b8b5e86befe75c4a9adb379161e4e205cca1c544c874ef352c4eee89bf0b193daad1c322f9080443c6b808e98cd5d56308ec90ec1b709067bc4facb245fdaf25f630d8a3048c12b4222d335532bc77f33fc814df313f713b0da21cc9a4c142c46d4b1c5bcd8948b6e2304c7935795c6075bfa8edbf408"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ff99d1c5e6ffffff00000000080001"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 648.765502] XFS (loop4): Invalid superblock magic number [ 648.887108] XFS (loop0): Invalid superblock magic number 22:37:48 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9b", 0xaa, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x9, 0x800) ioctl$VT_WAITACTIVE(r3, 0x5607) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f00000002c0), 0x347) sendmsg$NLBL_CALIPSO_C_LISTALL(r8, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008010}, 0x1) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000380)=""/22, 0x16) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) read$snddsp(r8, &(0x7f00000003c0)=""/6, 0x6) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) 22:37:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r5, &(0x7f00000002c0), 0x347) ioctl$RTC_WIE_OFF(r5, 0x7010) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$SIOCX25SENDCALLACCPT(r7, 0x89e9) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='H\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a0001007273767036000000184058379690f4b511a418a52a03c5bb00020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sysinfo(&(0x7f0000000340)=""/241) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="000000000000000000000000130001007273767036000000040002006378176707a047eddef0ba79b57e1246ee86be17d74b6c0cfa3645daf2ba934659a8d5a50249f63d0c6dc4baeab24263edd91257fa677ce17cf94d9ac7f9df014ad859032120b0a0e2a0246ad000a014263690e6950669f8cfe18797395a0fa10d14a91395769a8d2c21526f096894f3cf370fca41449d40e284da31cc9d95275903e54e6f7366ee50cb7c4d6fa32d10a91eed22646d39829fcb39298faae82103a268ad8571d3c18e790b5dd431f302725e2688df66ac12c76f5c5bd359"], 0x34}}, 0x0) 22:37:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030000727e609681085cb4c7a077316bb73f8de6a4cdc8c07c865d6c644a3c999add5c73fcf0d039cad1c35ea6d924273ba40643a542fd82c9cb83bb45270d058cd91a5a18558a2960d45515861fca69557ed7bb5280cf9183d52feab81698c00092e9f18e9a70576a40c9fa2d48dd70debd42718e3102bdfa7a6922b90bbe5f60d5046077f0b202489e650df1ab519f4b437fa6ae96c525d3ea528561df48747df13566acbd04cb2590cc5728fcddbb3f18ab96ffd36b1afff80ecb5f9a8"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200780, 0x0) openat(r0, &(0x7f0000000200)='./file0\x00', 0x10600, 0x180) 22:37:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9b", 0xaa, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada", 0xb6, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 649.238626] XFS (loop0): Invalid superblock magic number 22:37:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYRESHEX=r4, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076677468"], 0x48}}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x2, &(0x7f0000000380)="ebe521b5edfebce89056f2f11ca6f23f4d25fac6d4c25083408f3aef4b1d9fada1ec1a92cce87f8191dfa40e2802f556c70ff0688404f26961ed5fd04b7eb2a8194af9b69b4128dfdf06d96013278e4f6b4c044f3aa079ac14135ac864d91c23e6872242a119d8a25b9a1aa17653691953a0356914e4e204e5f94c6f573a04bd5eb31f3d27ca4172f48c6579e7d37d0e3b2a8e05e11467569e0b54a74280a84cd89838d60ee5cff918e95aa8334e02a1a2f0b41064c4e158b0021bca63339f54e91ac1058c012eeae4d4bade4eee49af", 0xd0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x2c, 0x28, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@TCA_CHAIN={0x8, 0xb, 0x2}]}, 0x2c}}, 0x0) 22:37:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada", 0xb6, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x40008890}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="e4b600001000050700f8ff001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x70bd26, 0x0, {0x0, 0x0, 0x4000, r6, {0x5}}}, 0x24}}, 0x0) 22:37:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada", 0xb6, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:48 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0x20, 0x70bd28, 0x0, {0x0, 0x0, 0x4000, r6, {}, {0x0, 0x6}, {0x2, 0x6}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x48014) 22:37:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000140)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0xbc, 0x0, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x39dcba01}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_MESH_CONFIG={0x3c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x6}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x48}, @NL80211_MESHCONF_PATH_REFRESH_TIME={0x8, 0x9, 0x800}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x4}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x8001}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x9}]}, @NL80211_ATTR_MESH_CONFIG={0x4}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x44, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x94}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x9}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x1e}, @NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0x3}, @NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0x82}, @NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0x10000}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x87}]}]}, 0xbc}}, 0x20040001) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) mount$9p_virtio(&(0x7f0000000200)='syz\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0xa, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=virtio,access=user,cache=fscache,access=client,fowner=', @ANYRESDEC=r5, @ANYBLOB=',func=KEXEC_INITRAMFS_CHECK,euid=', @ANYRESDEC=r1, @ANYBLOB=',mask=^MAY_EXEC,fsmagic=0x0000000000000985,obj_user=/dev/loop,euid=', @ANYRESDEC=r3, @ANYBLOB="2c00d32eda5ba33d86fb4ba5785febc1f5990a0d6c165ec3332115efbfab3470aa2a611195010c302f2f1515c2836f5d2e339a9a5da50903aa5b17b2a2bd3e95d7a49df2c266c605bb1db30e0089971fb9dfd695d312632446d04d1f9a47bfdce78c1ee0b7666c8e6c7e184a6710bffd002c9b55ab74581fd86b3260728acdaa3cba2f95f6d02dcf401e2f2067063e7879855d9afcc605c70c4724dcc0f6c28649a1fbc75a21f8d420a4afa8925e00"/203]) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) setresuid(0x0, 0x0, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r7, 0x202002) keyctl$chown(0x4, r7, 0xee00, r6) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{0x0, 0x0, 0x0, 0x0, r6, 0x100, 0x4}, 0x0, 0x0, 0x8, 0x9, 0x2e333701, 0x9, 0x8, 0x73, 0x80, 0x100, r8, r9}) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {0x0, 0x6}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$TIOCGSOFTCAR(r7, 0x5419, 0xfffffffffffffffd) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 649.782470] XFS (loop0): Invalid superblock magic number 22:37:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 649.947013] nla_parse: 119 callbacks suppressed [ 649.947021] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 22:37:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev/loup0\x00'], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000000c0)={0xfffffffffffffffe, 0x7}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 650.035083] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 650.119709] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 650.142352] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 22:37:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20420, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x10000}, 0x0, 0x0, 0x4, 0x4, 0xfffffffffffffffd}, 0x0, 0xff7ffffffffffdff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000000dc0)=[{&(0x7f0000000000), 0x1}, {&(0x7f0000000040)=0x2, 0x1}, {&(0x7f0000000140)=0x2, 0x1}, {&(0x7f0000000180)=0x1}, {&(0x7f0000000200)=0x2}, {&(0x7f00000002c0), 0x1}, {&(0x7f0000000300)=0x1, 0x1}, {&(0x7f0000000340), 0x1}, {&(0x7f0000000380)=0x2, 0x1}, {&(0x7f00000003c0)}, {&(0x7f0000000440)=0x1}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=0x1, 0x2}, {&(0x7f0000000500)=0x1}, {&(0x7f0000000540)}, {&(0x7f0000000580), 0x2}, {&(0x7f00000005c0)=0x2, 0x1}, {&(0x7f0000000600)}, {&(0x7f0000000640)=0x1, 0x2}, {&(0x7f0000000680)=0x1, 0x1}, {&(0x7f00000006c0), 0x2}, {&(0x7f0000000700)=0x2}, {&(0x7f0000000740), 0x1}, {&(0x7f0000000780), 0x2}, {&(0x7f00000007c0), 0x1}, {&(0x7f0000000800)=0x2, 0x1}, {&(0x7f0000000840)=0x2}, {&(0x7f0000000880), 0x2}, {&(0x7f00000008c0), 0x1}, {&(0x7f0000000900)=0x2}, {&(0x7f0000000940), 0x2}, {&(0x7f0000000980)=0x1}, {&(0x7f00000009c0)}, {&(0x7f0000000a00)=0x2}, {&(0x7f0000000a40)=0x1, 0x1}, {&(0x7f0000000a80), 0x1}, {&(0x7f0000000ac0), 0x2}, {&(0x7f0000000b00), 0x1}, {&(0x7f0000000b40)=0x1, 0x1}, {&(0x7f0000000b80)=0x1, 0x2}, {&(0x7f0000000bc0)=0x2}, {&(0x7f0000000c00)=0x2}, {&(0x7f0000000c40), 0x1}, {&(0x7f0000000c80)=0x1}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)}, {&(0x7f0000000d40)}, {&(0x7f0000000d80)=0x2, 0x1}], 0xd, 0x30, &(0x7f00000010c0)={0x0, 0x3938700}, 0x0, 0x0) syz_read_part_table(0x7, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 650.176114] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 650.200121] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 22:37:49 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 650.237476] XFS (loop5): Invalid superblock magic number [ 650.247526] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 650.269108] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 22:37:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40180, 0x0) shutdown(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/11], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 650.297734] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 650.317654] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 22:37:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000380)=""/218) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 650.569014] XFS (loop0): Invalid superblock magic number 22:37:49 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x0, 0x7, 0x0, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFACCT_FLAGS={0x8}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4040090) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="000000000000d5d109155d382fe3b5397f4284a9"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) 22:37:49 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4bea", 0xbf, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x40210000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000000c0)={0x0, 0x40}) 22:37:49 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000080)={0x1ff, {0x2, 0x3cd, 0x6, 0x1, 0x1, 0x40}}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB='\x00fq\x00'/19], 0x74}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@deltfilter={0x24, 0x2d, 0x200, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0xd, 0x1}, {0xb, 0x1}, {0xfffc, 0x2}}}, 0x24}}, 0x4040885) 22:37:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="7400070000000000000080000000000000000000eaef86584f2201c8", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c40)=@newtfilter={0x484, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x454, 0x2, [@TCA_RSVP_ACT={0x440, 0x6, [@m_simple={0x104, 0x7, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x78, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x3, 0x20000000, 0x0, 0x689}}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x9, 0xffffffffffffffff, 0x61, 0xfffffff8}}, @TCA_DEF_PARMS={0x18, 0x2, {0x1, 0x9, 0x0, 0x7fffffff, 0x200}}, @TCA_DEF_DATA={0xa, 0x3, 'rsvp6\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x4b33, 0x10001, 0xffffffffefffffff, 0xffff9e53, 0x1}}]}, {0x61, 0x6, "54edb0fac8b8d0b4a3dc89bc9771bf69e1d12321bb72ffa2ca85bee5b460b997982f3c074217e09b104f25d7a0255624233d1852bac402f0b636c2197e1762c58e493bbfa7fa4ee4027db360e10bc91dcdeb1196e00d93e00cc217ad8f"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ife={0x44, 0x7, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @TCA_IFE_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_bpf={0x94, 0x17, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x6c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x4, 0x0, 0x5, 0x7fff, 0x8001}}, @TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8, 0x5, r4}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8, 0x5, r6}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1, 0x0, 0x5, 0x7, 0xffff21a3}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_simple={0x154, 0x8, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x1, 0x3, 0x0, 0x10000, 0x6}}, @TCA_DEF_DATA={0xc, 0x3, '\xea&]\x06-^*\x00'}, @TCA_DEF_DATA={0x6, 0x3, '(\x00'}]}, {0xfc, 0x6, "317298ce1a10ba587b28ec0f5b5d467f79d19f1464dc896fa968b46d415b34952e2153a024c50ed65cca25a250e8cc6c1464a8c9f99b31c2554a333100d65bfbf8a00c714a118bc21fc375da8b8eedfd0943178441df9aa74e061af6ff6291669bbeb33bc8436c5cc1372cfff64470dd05f8497a480f560fd5fc0b4df828bf4d5c5682400941319f0094ca6426932cbd2634569e69636653a4f53bbaf3b067315622a58740540b001a05fbd42cf55d89c168ec08cf2cd27674ab5a30d07889f5e158600279c3c7eec4202ba4749acc7442cc1eee826150088662de19531fd53042dd595d2b28c6d847d85bd98311de47d682d07f7d0463da"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_sample={0x10c, 0x1f, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x4}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x1ff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x7, 0x3295, 0x20000000, 0xd0, 0x9}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x3ff, 0x7, 0x0, 0x7, 0x1a}}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x3f}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x710a85c5}]}, {0x8d, 0x6, "1ccda792b1d725c90557d430c127eaa9d04c6b2f27fc3e2624e14e0f129b9622c95ab4dc41530eafb33aca5fe5fe082c49f2bae94426d84d0dad043646221f6aafb0dcd0462f026dda17bf51adfe578f07c44869dcdd000e9e4558e193b7ce172091e488bdf651496db6bde9829d18076b2baec6e02cf9f4808c6edc61471b315f901db014da9aa583"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}, @TCA_RSVP_POLICE={0x10, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x7ff}]}]}}]}, 0x484}}, 0x44005) 22:37:49 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4bea", 0xbf, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 650.854484] XFS (loop4): Invalid superblock magic number 22:37:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x347) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000140), &(0x7f00000002c0)=0x4) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) write$P9_RXATTRCREATE(r6, &(0x7f0000000300)={0x7, 0x21, 0x1}, 0x7) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="480000002800270d000000000000f90000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32=r7, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) 22:37:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000002800270d00000000000000000000000020c62dc7173e24e4ea4b182a83391d506ac77d24b8369af842e29ef31ac6e0a8fab78e55815ad38a1dcb4d20f5950c2ad7a2a8e00ffb", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4bea", 0xbf, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 651.052616] XFS (loop5): Invalid superblock magic number 22:37:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746864119cacc123a8e9e2ef2d3df26b1fca0b1f277dbcaa05f3fbb574df51cca5a7afeb855b228370068d868015e689342b49fa066d4272c3eb081f617491"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070400"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:50 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) sendmsg$NFT_MSG_GETOBJ(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x13, 0xa, 0x801, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0xffffffffffffff02}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x11) umount2(&(0x7f0000000000)='./file0\x00', 0x14) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) sysfs$2(0x2, 0x286b, &(0x7f0000000380)=""/80) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x84, 0x0) ioctl$CHAR_RAW_SECDISCARD(r2, 0x127d, &(0x7f0000000180)=0x4) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '!!'}, {0x20, '&&!%$'}, {0x20, 'xfs\x00'}], 0xa, "a2f8d3e51adfa61df0783783b60aee3e26545a3c1e4c754489169fe691c64eac992d968f101fc67349a700c3252f373ca309a2408866b21e"}, 0x51) 22:37:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95", 0xc1, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) read$fb(r7, &(0x7f0000000080)=""/1, 0x1) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="8c0100003100100026bd7000fddbdf25000000000400010080000100140004000f00010074756e6e656c5f6b657900000c001e0008000300001000000c001f0008000300080000000c000400080003000700000010000600090001006373756d0000000010009f0009000100766c616e000000000c000b00080003002f0900000c00030008000300030000000c001e000800030007000000900001000c0013000800030007000000100010000b000100736b626d6f640000100007000b0001006d697272656400000c000c0008000300000001000c0006000800030003000000100001000c000100736b626564697400100019000b0001006d6972726564000010000d000a00010070656469740000000c00080008000300010400000c0005000800030030f90000640001000c00150008000300018000000c00060008000300f60300000c00080008000300f9ffffff0c00010008000300ffff00000c001e00080003008b0e00000c000c0008000300040000000c00150008000300000000000c000000080003000100000064afe8372bccca4f3e53670ad24530d9d9bae58359ac9bb215aa0f5baf1fc767df5649a3a589dea2a21b797a029e5d145ddb097434ba0e0c5e707f7a8095f40bc72fbd3904c0ca5b89b2ec4a63dcc611a9bd43881287258ac741e3e2495a50f2d5e99dde4dc4aaf6416b4c4105ee9314f4b376555bc9a99edf17240c1e80b3d7ac3ecc4e4c2bc31c3d3c7e2c8279eed9c3bf3f0df10703f8d9527983b1a7d570b11b92adade9b234457f1da3305555cfaf473e0201cf4a029eb4f0b30a761795bfc6941ca4b019dc591a48dacf4440a4b4f66bd98a5d72f57b0c14c230"], 0x18c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000001102270d0000000000000000000000409a2937139cc09ff64075d7c53b9776e1251ddd8ecc49231d9cf8af8b14f79c9029497638d1111890a7eb908aaced96a4bed317f81a14692a0e29bafb7a8a94561bdcd1fedccde96332d45c0ef8b9d130b111007b0ffbac8a8436b99631a4", @ANYRES32=r6, @ANYBLOB='\x00'/12], 0x24}}, 0x0) 22:37:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r5, &(0x7f00000002c0), 0x347) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB='H\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a00010072737670360000001800ffff14000200fe8000000020000000000000000000aa"], 0x48}}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x410000, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 651.579384] qfq: no options [ 651.649204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=529 sclass=netlink_route_socket pid=2116 comm=syz-executor.3 [ 651.663890] XFS (loop4): Invalid superblock magic number [ 651.671507] qfq: no options 22:37:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', r9}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=@getchain={0x5c, 0x66, 0xc00, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r10, {0xb}, {0xc, 0xe}, {0xb, 0xe}}, [{0x8, 0xb, 0xfff}, {0x8, 0xb, 0x1a74}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x40000000}, {0x8, 0xb, 0xe0ee}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x48010) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r11}}, 0x24}}, 0x0) 22:37:50 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000eb000000070000000010000000000000404f1595b9f3baa0f7010738517e43e32890928981eccbf849be484b0d3c69034e0f0b3985238bdd3ed958f0bbdb1881222611431d305293bf05cbb16da1bde6a74a035e344094a8e628608ea16f719e32bef25c656f3b5368aad002669427e413ae78c2056be107f45e414a8c6ee9dd92e348153632fb54e419da17f9252385599791af7284688fe7df551ae3efe3fce11eb74593a68ba533c3147ea148b98dc54bad5809a19bbaba67d4c645eb64f07fa440674f16281f93f7cb0c31492c40d7f41ff6093aaeb265637054", @ANYRES16, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x20000800) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r5, &(0x7f00000002c0), 0x347) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x28, 0xd27, 0x200, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x10}, {0x0, 0xfff5}, {0xfffa}}}, 0x24}}, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2bb4e0cb0174777a, 0x0) bind$rxrpc(r6, &(0x7f00000000c0)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x36}, 0x1}}, 0x24) 22:37:50 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) connect$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1, 0x3}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x3}, &(0x7f0000000180)=0x28) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x8, 0x1000, 0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 651.742921] XFS (loop5): Invalid superblock magic number 22:37:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95", 0xc1, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r3, 0x0, 0x10) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x54, r4, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000140)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f0000000540)={&(0x7f0000000380)="7ef298dad98be4309220f7783e395ed228dbd09b2ff33e8c45a678bddc2613821db7c97f20bb931261e317f6ed596a8c0ea179635db1b63918dedfbd62df5210203232b62970fd0e12c5518c405a1df5ae411a2ab59e31e7e58501733f9021b37cf7fd489c7879175c5b630b221fdcf74519aa01b0e207a001ce293e44d18085fb07b15bf74cdc0ab7f4c50509d35c890aba69a25f35d6fd4d8e2981b754854cdee4eeb52c76c39ebc52c630072350ee1af969c7700e711f888c99c1ffee751fad404f855dfb3f11b725297a808e71a30f74658117032ffff8a3d96e0c5f771cf9d9edabaa58bbfbbc5c582759c035e0489f9b46", 0xf4}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r9, @ANYBLOB="000000000000000e280012000c03010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="d00000002800270d00"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000003806e5f6fea78f0000000a0001007273767036000000a000020014000200fe8000000000000000000000000000aa540005000c000808000400350000003c000100ff0f0000050000007f0000000000000001800000040002003f0083000800000020000010ff7f00009d00000003000000d600000005000000200004000004000000800000ee000000eb29000004000000070000000c09090014000200200100004cf80000000b6a01dd3ee447a4ac79bbd1"], 0xd0}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xa}, {0x0, 0xffe8}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r9}}, 0x24}}, 0x0) 22:37:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x1) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB='H\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="0000010072737670360000001800020014002200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="00000000000000010100000000000000727376703600000004d423e1"], 0x34}}, 0x0) 22:37:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2400900}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x100, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0xca0, 0x10}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x8000) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 652.084441] XFS (loop5): Invalid superblock magic number [ 652.168003] XFS (loop4): Invalid superblock magic number 22:37:51 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) sendmsg$IPCTNL_MSG_CT_GET_DYING(r7, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x6, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x7}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2004810}, 0x1) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3) 22:37:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95", 0xc1, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000080)=0x5, 0x2) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_AGP_INFO(r7, 0x80386433, &(0x7f00000002c0)=""/97) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x40000) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newchain={0x2310, 0x64, 0x300, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x3, 0x8}, {0xfff2, 0x6}, {0xd, 0xb}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x22bc, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_FD={0x8}, @TCA_BPF_ACT={0x22a0, 0x1, [@m_police={0x229c, 0x1b, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x217c, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x10001, 0x1, 0x8, 0x200, 0xedf, 0xd4800000, 0x3, 0x731c, 0x3ff, 0x5381, 0x8000, 0x5, 0x9, 0x6, 0x4a, 0x3, 0x5, 0x974, 0x9, 0x9, 0xffffff9f, 0x2, 0x6, 0xec6, 0x40, 0x4ff6, 0x3, 0x800, 0x8, 0xffffffe1, 0x401, 0x6, 0x8, 0xb66, 0x7, 0x40, 0x1, 0x3, 0x1, 0x5, 0x7f0000, 0x80, 0x8769, 0x2, 0x2aea, 0x0, 0x3, 0x7fffffff, 0x4, 0x8, 0x7, 0x800, 0x1, 0x2, 0x10001, 0x7, 0x9, 0x66c, 0x6, 0x4, 0xe42, 0x7, 0x8001, 0x9, 0x81, 0x5, 0xdf3c, 0xe0, 0x6, 0x100, 0x10000, 0x1, 0x0, 0x4, 0xd1e, 0x1f, 0x7, 0x4, 0x7f, 0x81, 0x7, 0xffff, 0x7, 0x6, 0x954, 0x6, 0x58d, 0x5, 0x4, 0x5, 0x9, 0x9, 0x9, 0x8001, 0x7, 0x1ff, 0x3f, 0x8001, 0x3, 0xb1, 0x7, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0xe654, 0x1, 0x3, 0x10001, 0x4b, 0x7f, 0x9, 0x0, 0xe9, 0xff, 0x20000, 0x120, 0x8, 0x3, 0x691, 0x80000000, 0xff, 0x3, 0xea4b, 0x80000001, 0x9, 0x6, 0xddd, 0x5, 0x1, 0x0, 0x8000, 0x9, 0x7, 0x4, 0x0, 0xffff647a, 0x2, 0xe265, 0x1000, 0x8, 0x5db4, 0xc62, 0xdd1, 0xffffffff, 0xffffd656, 0x84, 0xc0, 0xf, 0x2, 0x1, 0xd79, 0x7, 0x40, 0x3, 0xfffffc01, 0x7ff, 0x0, 0x3, 0x0, 0x4, 0x5943, 0x7f, 0x3f, 0x7, 0x2, 0x10001, 0x9, 0xffffffe0, 0x101, 0x80, 0x0, 0x97b, 0x8, 0x2d7, 0x5, 0xfffffffe, 0x8, 0xfffffff7, 0x57, 0x1, 0x7200e4f8, 0xfff, 0x100, 0x1, 0x8001, 0xffff, 0x1f, 0x1, 0x2, 0x400, 0x1f, 0x40, 0x4, 0x9, 0x957, 0x80000000, 0xb1e9, 0xcfd, 0x71, 0x40, 0x1ff, 0x7, 0x10001, 0x7fffffff, 0x6, 0x7a, 0x7fffffff, 0x3f, 0x81, 0x7, 0x4, 0x80000001, 0xffff0001, 0x7fffffff, 0x84315285, 0x8, 0x1, 0x800, 0x0, 0xfff, 0x5, 0xffffffff, 0x4, 0x400, 0x400, 0x5, 0x9, 0xfffffff8, 0x100, 0x7e000, 0xab06ee17, 0x9, 0xc2, 0x80, 0x9, 0xfffffff9, 0xfffffffa, 0x81, 0x6e7800, 0x50d7, 0x6, 0xc14c, 0x6, 0x2b9c, 0x9, 0x8, 0xfffffffc, 0x6, 0x40000000, 0x9, 0x39f6, 0x8001, 0x0, 0x4]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7ff}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0xf7, 0x3, 0x800, 0x4, 0x4, 0x0, 0x4, 0x2, 0xc440, 0x1f, 0xe265, 0x9, 0x1ff, 0x21b, 0x1, 0x6, 0xff, 0x796a0dc3, 0x5, 0x5, 0x0, 0xa0, 0x8, 0x3f, 0x7, 0xa1, 0x1, 0xcad2a89, 0x3, 0x7, 0x2, 0x6414, 0x4863, 0x5, 0x81, 0x1, 0x5, 0x1, 0x0, 0x7fff, 0x8, 0x8, 0x0, 0x2, 0x10001, 0xff, 0x2, 0x1, 0x9328, 0x2a, 0x4, 0x7, 0x3ff, 0x5, 0x9, 0x2, 0x434, 0x7f, 0x3358e925, 0x7, 0x7ff, 0x9, 0x0, 0x4, 0x10001, 0x1, 0x0, 0x2b, 0x18, 0x400, 0x4, 0x7, 0x9, 0x9, 0x1, 0x7, 0x3, 0x0, 0x4, 0x100, 0x8001, 0x4, 0xabd4, 0x1000, 0x401, 0x2, 0x4, 0x7fff, 0xffffffff, 0xc9a3, 0x8, 0x3, 0x5, 0x9, 0x6, 0x0, 0x228ac3fc, 0x8, 0x7ff, 0x3d42, 0xbf, 0xae5, 0x200, 0x0, 0x401, 0x401, 0x6, 0x3, 0xfffffffd, 0x1, 0xffffffff, 0x63, 0x5, 0x800, 0x6, 0x8, 0xffff, 0x8, 0x2, 0xd60, 0x7fff, 0x0, 0x101, 0x9, 0xd866, 0x0, 0xfffff001, 0xff, 0x7fffffff, 0x4b118eb7, 0x3b8e, 0x5b96, 0x40, 0x1ff, 0xffff0000, 0x9, 0x8, 0x20, 0xff, 0x5, 0x5, 0x0, 0x80, 0x9, 0xfffffffe, 0xfff, 0x7ff, 0xc2, 0x1, 0x400, 0x0, 0x7, 0x2, 0x4, 0x1, 0x3, 0x8, 0xffff, 0x4, 0x7, 0x10000000, 0x41f, 0x1, 0x400, 0xa16, 0x80, 0x2, 0x3, 0x10, 0x400, 0x4, 0x2, 0x6, 0x400, 0x4, 0x9, 0x0, 0x5f67, 0x101, 0x5, 0x5, 0x40, 0x8, 0x0, 0x48000000, 0x6, 0x80000001, 0x800, 0x8, 0x3b, 0x2, 0x0, 0x401, 0xaa, 0xcea, 0x7fffffff, 0x9, 0x46, 0x832, 0x4a, 0x5, 0x1, 0x6, 0x2f42, 0x6, 0xfffffff9, 0x5, 0x0, 0x401, 0x7, 0x0, 0x80000001, 0x1, 0x86e4, 0x0, 0x7, 0x800, 0x401, 0x80000001, 0xe5e, 0x8, 0x5, 0xfff, 0x7, 0x3f, 0x6, 0x0, 0x7, 0x5, 0x1, 0x7fffffff, 0x401, 0x8, 0x1000, 0x0, 0x3, 0x9, 0x7, 0x7ff, 0x40, 0x3, 0x7f, 0xfffffffd, 0x0, 0x7, 0x4, 0xd204, 0xffffff80, 0x81, 0x0, 0x9, 0x2, 0x8d, 0x2, 0x7]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x3f, 0x0, 0xf76, 0x1, 0x8b6, 0x7a5, 0x52, 0x1, 0x401, 0x0, 0x3, 0x0, 0x6b70, 0xffffffff, 0x1, 0x1, 0xfffffe03, 0x0, 0xffff0000, 0x1, 0xcc9, 0x28000, 0xfffffff9, 0x6, 0x3, 0x45, 0x2, 0x9, 0x8, 0x6, 0x80000000, 0x7, 0x5, 0x80000001, 0x1, 0x9, 0x3, 0x5, 0xffffff54, 0x16, 0x800, 0x80000000, 0x3ff, 0x3, 0x7f, 0x1, 0xfff, 0x5, 0x44c, 0x9, 0x20, 0x78d, 0x3, 0x1f, 0x9, 0x75, 0x40, 0x3, 0x556ec478, 0xce, 0x6, 0xc8, 0x7, 0x910, 0x9, 0x401, 0x8, 0x800, 0x8000, 0x401, 0x5408, 0x7f, 0x6, 0x2, 0x3, 0x20, 0x1d66b3a7, 0x7, 0x2, 0x20, 0x1ff, 0x2, 0x1, 0x10001, 0x9, 0x0, 0x5, 0x3ff, 0x0, 0xebaa, 0x9, 0x20, 0x7, 0x95, 0xc2, 0x6, 0x10000, 0x1000, 0x9b, 0x3f, 0x80, 0x9, 0x0, 0x2, 0x7fffffff, 0x3b, 0x7ff, 0x2, 0x7, 0x8, 0x80000001, 0x6be, 0x7ff, 0xffff, 0x10000, 0x401, 0x8, 0xfffffc00, 0x1, 0x5, 0xff, 0x6, 0x3, 0xb2a, 0x2, 0x2, 0x2, 0x0, 0x3, 0x2, 0x7, 0x80000000, 0x0, 0x8001, 0x81, 0x3, 0x3ff, 0x7, 0x2, 0x7, 0x7, 0x0, 0x7ff, 0x4, 0xc, 0xacc, 0x1, 0x7, 0x2, 0xfff, 0x8, 0x20, 0x5, 0xb3c7, 0x81, 0x7, 0x6, 0x9c2, 0x9, 0x8, 0x4, 0x6, 0x7d, 0x4, 0x425, 0xfff, 0x79d22714, 0x750d, 0x6, 0x2, 0x8, 0x8, 0x1f, 0xf2, 0x8001, 0x59800000, 0x4, 0x0, 0x9bac, 0x200, 0x9, 0x8001, 0x2, 0x9, 0x6, 0x80000001, 0x2, 0x1, 0x80000000, 0x2ee7, 0x4, 0x101, 0x9, 0x4, 0x1000, 0x7, 0x5, 0x232e, 0x1ff, 0x8, 0x7, 0x8, 0x7fff, 0x3f, 0x1, 0xb1, 0x100, 0x10001, 0x0, 0x7f, 0xad14, 0x80, 0xffff, 0x8, 0x80, 0xfffffffa, 0x1, 0x7ff, 0x2, 0x5, 0x0, 0x20, 0x80000001, 0x7fff, 0xfff, 0xffffffff, 0x200, 0x8c11, 0x9, 0x8000, 0xdc9, 0x101, 0xffffffff, 0x60, 0x2, 0x4, 0x9c81, 0x3, 0x8, 0x6, 0x6, 0x2, 0x10000, 0x7, 0xffffffff, 0xc7, 0x400, 0xfffffff8, 0x7, 0x1, 0x2, 0x5, 0xfff, 0xfffffff7, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x3, 0x5, 0x5, 0x0, 0x35b, 0x6, 0x4, 0xc2, 0x9, 0x8, 0x9, 0x0, 0x7, 0xfffffe57, 0x8000, 0x1000, 0x8, 0x200, 0x4, 0x7ff, 0x8, 0x1, 0x7, 0x72, 0x8, 0x0, 0x0, 0xc89a, 0x4, 0x6, 0x9, 0x0, 0x7f, 0x5, 0x2, 0x1, 0x3a58, 0x200, 0x2, 0x822, 0xfff, 0x2, 0x8001, 0x3, 0x0, 0x0, 0x1f, 0x8000, 0x3, 0x6, 0x995, 0x4476, 0x5, 0x5, 0x8, 0x6627, 0xf8, 0x80000001, 0x40, 0x4, 0x8, 0x8, 0x5, 0x20, 0xffffffff, 0x4, 0x8001, 0x9, 0xc5, 0x2, 0x7, 0x40, 0x3, 0x9, 0x7fffffff, 0x947c, 0xffffffff, 0x7, 0x2, 0x1, 0x3ff, 0x7, 0x7cf, 0x9, 0x7ff, 0xf82, 0x8000, 0x2, 0xffffffff, 0x7f, 0x3, 0xffff, 0x117, 0x1, 0x60, 0x7fffffff, 0xffff, 0x7ff, 0x68e6, 0x80000001, 0x8, 0x2, 0x2, 0xff85e17, 0x8, 0x57, 0x3ff, 0xc20, 0x5, 0x9, 0x1, 0x0, 0x9, 0x7ff, 0xffffffff, 0x4, 0xffffffff, 0x208, 0x3, 0x2, 0x6, 0x9, 0x6, 0x9948, 0x0, 0x6ea8000, 0x6e, 0x9, 0xffff, 0xe, 0x7, 0x9, 0x36, 0x9, 0x0, 0x8, 0xe889, 0x800, 0x2, 0x2, 0x3, 0x0, 0xffff, 0x8, 0x4c88, 0x174, 0x5, 0x8, 0x400, 0x200, 0x9, 0x6, 0x7fff, 0x8, 0x6, 0x2, 0xff, 0x10001, 0x1, 0x400, 0x0, 0xfffffffc, 0x9, 0x6, 0x20, 0x4, 0xafbe, 0x8, 0x7, 0xf5, 0x740, 0x3ff, 0x1, 0x65, 0x9, 0x3, 0x9, 0x7a, 0x1, 0x8e8, 0x8, 0x8, 0x80000001, 0x7fff, 0x8001, 0x2, 0x0, 0x6, 0x8, 0x3, 0x7ff, 0xc7fa, 0x101, 0xc, 0x9, 0x1, 0x8000, 0x2, 0x14, 0x8, 0x40, 0x7, 0x8000, 0x1, 0x4, 0x4, 0x400, 0x100, 0xb1, 0x8, 0x5, 0x3, 0x5, 0xc7, 0x0, 0xa, 0xfffffff7, 0x2, 0x43, 0x4, 0x9, 0x7, 0x400, 0x800, 0x21097a74, 0x10001, 0x0, 0x3ff, 0x0, 0x8, 0x10000, 0x8, 0x5, 0x3ff, 0x5, 0x6, 0x4, 0x40c, 0xfff, 0x5d13, 0x200, 0x3, 0x4, 0x5, 0x0, 0x1, 0x3, 0x4, 0x63, 0x8, 0x7ff, 0x10d, 0x7, 0x100, 0x1de69b71]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x7ff}, @TCA_POLICE_RATE64={0xc, 0x8, 0x6}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9c9}], [@TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x6}, @TCA_POLICE_RATE64={0xc, 0x8, 0xfffffffffffffffd}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x5, 0x20, 0x1, 0x0, 0x0, 0xfff, 0x6, 0x7, 0x0, 0x4, 0x4, 0x0, 0x5, 0x7fff, 0x9, 0x101, 0x1ff, 0x8, 0x5e4f, 0x9, 0x3ee8db26, 0x1ff, 0x10000, 0xffff, 0x9, 0x1, 0x800, 0x4, 0x10001, 0x200, 0x80000000, 0x6, 0x0, 0x4, 0x400, 0x7f, 0xb61, 0xffff, 0xd3e, 0x5, 0xafd8, 0x80, 0x1000, 0x9, 0x1c62, 0x1f, 0x1, 0x1, 0x5, 0x2, 0x3, 0xe574, 0x7, 0x6, 0x1000, 0x7fff, 0x200, 0x3ff, 0x5, 0x597, 0x3, 0x0, 0x100, 0x9, 0x8001, 0xffffffff, 0x3, 0x80, 0x5, 0x6478, 0x1, 0x1, 0x28, 0x4, 0x1, 0x3, 0x2, 0x5c8a, 0x2, 0x2, 0x2, 0x3f, 0x80000000, 0xf9b, 0x1, 0x9, 0x40, 0x6, 0xffff, 0x5, 0x3f, 0xffffffff, 0x6, 0x7, 0x400, 0x101, 0x7, 0x5, 0x91, 0x9, 0x8000, 0x4, 0xe6, 0x7, 0x1, 0x5, 0x8000, 0x0, 0x0, 0x2, 0x4, 0x3, 0x9, 0x9, 0x5, 0x1, 0x10000, 0x6, 0x7f, 0x260c, 0x7, 0x101, 0x97, 0x2, 0x3d, 0x10000, 0x5, 0x0, 0x5, 0x7f, 0xff2, 0x6, 0x5, 0x1, 0x9f, 0x4, 0xa7, 0x80000000, 0x8, 0x7, 0x8, 0x7, 0x401, 0x4, 0x200, 0x1f, 0x1, 0xffff, 0xff, 0xff, 0x8, 0x1, 0x1, 0xffff, 0x9, 0x9, 0x10000, 0x80000001, 0x8, 0x6, 0xffff, 0x1000, 0x6, 0x8000, 0x401, 0x800, 0x7, 0x6, 0x900000, 0x8632, 0x7fff, 0x1, 0x3ff, 0x2, 0x1, 0x0, 0x8, 0x4, 0x3, 0xfff, 0x400, 0x2, 0x8000, 0x2, 0x1, 0x7fff, 0x1, 0x9, 0x5, 0x1, 0x9, 0x2, 0x5fe4, 0x6f5, 0x0, 0x2, 0x9, 0x5, 0x9446, 0x40, 0x401, 0x8, 0x6, 0x24a9, 0x6, 0x7, 0xffff, 0x9, 0x400, 0x8, 0x20, 0xae, 0x1f, 0x80, 0x8001, 0x5, 0x81, 0x7474, 0x7fe, 0x1, 0x4, 0x4, 0x1000, 0x1e77, 0x8, 0x80, 0x3a, 0x0, 0x4, 0x6, 0x200, 0x7, 0x1000, 0x78da, 0x1ff, 0x3, 0x8, 0x145, 0x3da1, 0x401, 0x7, 0x70d2, 0xd98, 0x7b, 0x7, 0x10000, 0xfffffbff, 0x6, 0x8000, 0xfffffff7, 0xff, 0x2e736074, 0x4, 0x100]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x3}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xffff}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7d, 0x3, 0x80000001, 0x200, 0x2888, {0x80, 0x2, 0x6, 0x8, 0x2, 0x7}, {0x5, 0x0, 0x7, 0x1, 0x9, 0xfffff801}, 0x200, 0x4, 0xffffffff}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x3}, @TCA_POLICE_RATE64={0xc, 0x8, 0x6f62}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xfffffffd}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1c000000, 0x1f, 0xffff, 0x0, 0x4, 0x7, 0x40, 0x80, 0x1, 0x9, 0x2, 0x5491, 0x7, 0xe8, 0x7f, 0x4, 0x4, 0x1, 0x6, 0x0, 0x5, 0x3, 0x5, 0x3ff, 0x1, 0xc1d3, 0x7fff, 0x4, 0x3e00000, 0x6a, 0x4, 0x3, 0x3, 0x4, 0x4, 0x3ff, 0x7299, 0xff, 0x5, 0xffffff80, 0x7ff, 0x6, 0x0, 0x6, 0x1, 0x0, 0x8, 0x319d, 0x6, 0x8, 0x800, 0x9, 0x1, 0x3, 0x1, 0x6, 0x9, 0x7ff, 0xfffffc2a, 0x1, 0xfff, 0xfffffffe, 0x9, 0x8, 0x7, 0x1, 0xffff0001, 0x0, 0x1, 0xdac, 0x80000000, 0x101, 0x990d, 0x5, 0x5, 0x3, 0x6, 0x6, 0x5, 0x1f, 0x200, 0xff, 0x3, 0x88b5, 0x9, 0x4, 0x176, 0x0, 0x20, 0x5, 0x6, 0x9, 0x2, 0xffffffc1, 0x86, 0x6, 0x4, 0x0, 0x80000000, 0x1ff, 0x913b, 0xfffffffc, 0x9, 0x8, 0x6, 0x5, 0x0, 0x0, 0x60ec02bc, 0x1cf2, 0x5, 0x915d, 0x0, 0x7, 0x800, 0x7ff, 0xfbf, 0x8000, 0x1000000, 0x2, 0x1000, 0xffff, 0x9, 0x7fffffff, 0x0, 0x0, 0x6, 0xfffffff9, 0x0, 0x800, 0x1000, 0x400, 0x7, 0x259, 0x8000, 0x5, 0xfff, 0xffff, 0x2, 0x9f3, 0x5, 0x20, 0x9, 0x0, 0x3, 0x80000001, 0x80000001, 0x4, 0x7, 0x9, 0x9, 0x7, 0x1, 0x8, 0x100, 0xffffffff, 0x7, 0xb386, 0x8000, 0x4, 0x0, 0xffffffff, 0x200, 0x5, 0x5, 0x1405, 0xeb, 0x0, 0xe4, 0xfffffffb, 0x4, 0x10001, 0x1000, 0xff, 0x6, 0xffffffc0, 0x1, 0x2, 0x8, 0x0, 0x7, 0x7, 0x401, 0x8000, 0x3, 0x4, 0x6, 0x8, 0x200, 0x4, 0x65d44800, 0x7, 0xd750, 0x10001, 0x7, 0x9, 0x80000000, 0x5, 0x1ff, 0x1, 0x1fb, 0x8000, 0x3, 0xffff, 0x10000, 0xd1, 0x81, 0x9, 0x7, 0x1, 0x8, 0x4, 0x7f06, 0x7, 0x3, 0xfffffff7, 0x4, 0x0, 0x9, 0x2, 0x3, 0x8001, 0x8, 0x1, 0x6914, 0x1, 0x0, 0x1, 0x9, 0x9, 0x1f, 0x3, 0x7, 0x800, 0x2, 0x6, 0x2, 0xeae3, 0x7ff, 0x1, 0x20, 0x7, 0xbd5b, 0x9, 0xfffffa5b, 0x80000001, 0x8, 0x1, 0x7, 0x0, 0x8001, 0x87, 0xecb7, 0xffffffff, 0x2, 0xfffffffd]}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x9}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0xf2, 0x1ff, 0x1ff, 0x3, 0x1, 0x401, 0xba, 0x2dd80000, 0x4, 0x5c1, 0x0, 0x0, 0x1ff, 0x6, 0x9, 0xdd3ad40, 0x5, 0xfffffffb, 0x1, 0x2, 0x2, 0xfffff000, 0x2, 0xb81b, 0x1, 0xffffffff, 0x7, 0x510c, 0x5, 0x80000001, 0x3, 0x1, 0x8, 0xf93, 0x3, 0x0, 0x3, 0x25, 0xffffff7f, 0x69, 0x3, 0x5, 0x1f, 0x4, 0x4, 0x80, 0x8, 0x0, 0x7, 0x6780, 0x1, 0x200, 0x1, 0x101, 0x7fff, 0x40, 0x7fffffff, 0x3, 0x20, 0x3, 0x6fe9, 0x80000001, 0x28, 0x7fff, 0x80, 0x5, 0x0, 0x1, 0x6, 0x8, 0x80000000, 0x7, 0x80, 0x7, 0x0, 0x6, 0x1, 0x3, 0x9, 0x3, 0x2, 0x11a, 0x1, 0xffffff80, 0xffffa732, 0x7f, 0x3f, 0x101, 0x88, 0x10000, 0x7f, 0x3, 0x80000001, 0x81, 0x8001, 0x2, 0x401, 0x3, 0x8000, 0xc6c000, 0x2, 0xfffffffb, 0xffff, 0x9, 0x3b8, 0x2, 0x5, 0x4, 0x3, 0x5, 0xffffffc1, 0x6, 0x200, 0x200, 0x1, 0x6, 0x7, 0xffffffc0, 0x45c, 0xffffffff, 0x5, 0x3ff, 0x7, 0x0, 0x400, 0xc5, 0x9, 0x1, 0x7, 0xbc1, 0x22e3, 0xfe000000, 0x0, 0x5, 0x3, 0x1ff, 0x66, 0x7ff, 0x7, 0xffffffff, 0x4, 0x96c, 0x1, 0xad77, 0xd400000, 0x981c, 0xfff, 0x5, 0x1c0000, 0x9, 0xffffffff, 0x4, 0xbad6, 0x1, 0x400, 0x2, 0x3, 0x697, 0xfffffff8, 0x3, 0x1f, 0x1, 0x1, 0x6, 0x1, 0x80000001, 0xfff, 0x10000, 0x4, 0x1, 0x0, 0x4d, 0xe90, 0x7ff, 0x10000, 0x1f, 0x101, 0x1, 0x1, 0x3, 0xff, 0x0, 0x80000000, 0x5, 0x7, 0x23, 0x4, 0x7e99, 0x9, 0x66b6, 0x7f, 0xffff9022, 0x11, 0x5, 0x2, 0x355, 0x7, 0x4, 0x0, 0x6, 0x6, 0x111f, 0x1, 0x380000, 0x8b, 0x5, 0x11, 0x6, 0x2, 0x9, 0x7fffffff, 0x9, 0x6, 0xd610, 0x8ee2, 0x5, 0x5, 0xff, 0x76, 0x2, 0xfff, 0x6, 0xfff, 0x8, 0x1b560, 0x81, 0xffffffff, 0x3, 0x4, 0x6, 0x3f, 0x1, 0x1, 0x8, 0x8, 0x2, 0x101, 0x3908, 0x4, 0x7, 0x5, 0xfffffff9, 0x8, 0x0, 0x401, 0x3, 0x8, 0x6, 0x2, 0x1, 0x401, 0x4, 0xdb, 0x18000, 0x80000001]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xfffc0000}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x2, 0x0, 0xffffffff, 0x8, {0x1, 0x2, 0x4, 0x68, 0x101, 0x200}, {0x8, 0x2, 0x8000, 0x1, 0x8, 0x101}, 0xa378, 0x4, 0x7ff}}], [@TCA_POLICE_RATE={0x404, 0x2, [0x8f20, 0x400, 0x8, 0x1d3, 0x0, 0xfff, 0x1d, 0x80, 0x6, 0x3f8, 0x5, 0x1f, 0x8, 0x0, 0x2, 0xff, 0x0, 0x1, 0xfffffffa, 0x2, 0xfff, 0x5, 0xae44, 0x27, 0x80, 0x6, 0x9, 0x0, 0x4, 0x7f, 0xffff7fff, 0xce97, 0x9eca, 0x8, 0x1, 0x20, 0x8, 0x3, 0x2, 0x8000, 0x1, 0x1, 0x1, 0x88, 0x3, 0x2, 0xfff, 0x59, 0x395883b1, 0x8, 0x9, 0x2, 0x7f, 0x3, 0x6, 0x1, 0xff, 0x81, 0x3, 0x7fff, 0xffff, 0x7, 0x3, 0x7, 0x8, 0x7fff, 0x5, 0x8, 0x5, 0xf320, 0x7ff, 0x7, 0x2, 0x2, 0x1ff, 0x4, 0xd230, 0x200, 0x6, 0xfaa, 0xfff, 0x4, 0x80000000, 0xffff, 0x1ff, 0xf9bf, 0xdc52, 0x80, 0x6c4, 0xfffffc00, 0x0, 0x400, 0x3, 0x2, 0xd57, 0x3ff, 0x2, 0x7, 0x10001, 0xffff0000, 0x2, 0x82, 0x994f, 0x3, 0x101, 0xffff8000, 0x0, 0xcca, 0x7fffffff, 0x7fc0000, 0x0, 0x80000000, 0x401, 0x0, 0x8000, 0x0, 0x6, 0x3, 0x4, 0xfff, 0x7ff, 0x7, 0x6, 0x9, 0xffffffff, 0x546c18d2, 0x0, 0x80000001, 0x8, 0xc8, 0x9, 0x7fffffff, 0x9, 0x7, 0xfffffffd, 0x9629, 0x4f3, 0x9, 0x8, 0x6, 0x100, 0x7, 0xd25a, 0x1, 0x1000, 0x800, 0xec, 0x7fff, 0x2, 0xfffffffa, 0x200, 0xffff, 0x4, 0x3ff, 0xffffff93, 0x4, 0xffff, 0xfffffffd, 0xfffffffd, 0x5, 0x6, 0xe774, 0x4, 0x80000000, 0x0, 0x3f, 0x3, 0x0, 0x1, 0x2, 0x6, 0x8000, 0x3, 0x4, 0x3f, 0x7, 0x3f, 0x8, 0x5, 0xbb, 0xfffffff7, 0x7fffffff, 0x2, 0x1, 0x800, 0x7fff, 0xffffffff, 0x6, 0x7, 0x8001, 0x7ff, 0x8, 0x8, 0x7, 0x10001, 0xae55, 0x6, 0x6, 0x4, 0x4, 0x9e, 0x70, 0x80000000, 0x6c11, 0x3, 0x2, 0x6, 0x80, 0x4, 0x101, 0x2, 0x5, 0x6, 0x6, 0x800, 0x0, 0x4, 0x4, 0x7ff, 0x7fff, 0x20, 0x2, 0x66, 0x323, 0xff, 0x101, 0x2, 0x8, 0x7ff, 0x1, 0xe2, 0x0, 0x6d2b, 0xe1, 0x1, 0x1, 0x9, 0x9, 0x401, 0x2, 0x5, 0xaa43, 0x200, 0x0, 0x1000, 0x7, 0x2, 0x80, 0x7, 0x8, 0x0, 0x8000, 0x100, 0x0, 0x9, 0x9]}]]}, {0xf8, 0x6, "cd22ee0a508b3c3c27a93fdd54b0556087b443eb01d1f5c35ce165a611820217fa09bbfc4d6eb86882a29f5380d5e7622965790862de10e3755e2296aedbfb6ad5ab068e22f29928e960ebca85de86153dcd63896cc9bf79b96167b27ae6628877bbda632ccf097a264ad0e4426999e58f5f5b30bb1da03392fee7218bc0edf7c18ec376f9dd0a4eff69fafb2c806315449d09120faf7f61eda4fef2bd8c6a38dcf616d6d3e06cfca6296da3945b7086edff8b87b3c2767ab2119a8ae622531a502c5f030fa371f4b275c98ec0a02d524b0e56041c1f6a72f23901d211899be0fbb1709f397034b3f25fe4da8a596d81281a9a08"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_BPF_FLAGS={0x8, 0x8, 0x1}]}}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x4}}, @TCA_CHAIN={0x8, 0xb, 0x4}, @TCA_RATE={0x6, 0x5, {0x3f, 0x6}}]}, 0x2310}}, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x347) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000000c0)={0x4, 0x3}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00K&V OdK\x00\x00'], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) 22:37:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="225589bf7cc2fa6a00000000ab469f5a75"], 0x48}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast1}, &(0x7f00000000c0)=0xc) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$KVM_GET_VCPU_MMAP_SIZE(r7, 0xae04) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="3400008b070093d0000000000000000000000000537e00d71e055308b8a58618362fbb03294cd06aacd1e976db3eb7dc101b4cc127390d3aeb0cceb2b73115e3de9f450ef24df270523e4751c587dab8d8f44050b3be20c3e8285fcc0fc5be30cf92045677f7", @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) [ 652.221277] XFS (loop0): Invalid superblock magic number [ 652.309264] XFS (loop4): Invalid superblock magic number 22:37:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x80, 0x0) syz_open_dev$vivid(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, r0, 0x2, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='\b6'], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000380), 0x0) bind$unix(r1, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e24}, 0x6e) write$FUSE_INIT(r1, &(0x7f00000002c0)={0x50, 0xffffffffffffffda, 0x2, {0x7, 0x1f, 0x0, 0x50400, 0x3, 0x4, 0x2400000, 0x1}}, 0x50) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r2, &(0x7f00000002c0), 0x347) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r2, 0xc0884113, &(0x7f00000000c0)={0x0, 0x4, 0x8, 0xd530, 0x8, 0x7, 0x40000000000000, 0x8001, 0x3, 0x3c47}) 22:37:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000000)='.\x00', 0x2) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1000000017010007002e2f66696c6530a5dcb7538ec7548b6e1c141dafba1ff7620c210b25e177517bedb6a0035408888ef251a753316770c89e01"], 0x10) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='H\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="00000000000000000000d800000a0001007273767036000000180002001400029f00fe8000"/49], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 652.474958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=100 sclass=netlink_route_socket pid=2253 comm=syz-executor.3 22:37:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x46040, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 652.672582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=100 sclass=netlink_route_socket pid=2253 comm=syz-executor.3 [ 652.686218] qfq: no options 22:37:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x5, 0x3, 0x9) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280812000c00010076653468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@getqdisc={0x3c, 0x26, 0x4, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x2, 0x1}, {0x8}, {0xffff, 0x8}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80c0}, 0x14) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000002800270d0000000000000000000000006e78b55d633a711bb6d2a2a67d85f6abf0ffcf8e66359439f180a203c617bb377ca0accc2da034e76309ad2681623ecc6971c5763946f721ad06921be2f3ca2df71a79d1db4e4db9717f53bed78b4eed63a4fccd4fa80bbc280e85ad", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 652.827772] XFS (loop4): Invalid superblock magic number [ 652.952217] XFS (loop0): Invalid superblock magic number 22:37:52 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000007f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r3, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r5}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r3, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x71}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10014}, 0x4004805) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="3000000000000000000000d7df4195ecc937382346988f11ee6e5670983b07b3b2c03e340d085c212028ecd6a6f7f10b219f17b1aa1e29d5c0502facf269c1cdb4d55e0047dcd99c7fae69f50eca74be3bce3c1726568d86c012f075fcdf0c4d42e30269221c3d98bf066350cfb4092de9353be409c279456b020b5ac40aabbd13b5a303b3d1e2398e85c6140c825d0fc06c3deb6fb70c0f5e6c20e72c19bc55f68f5507a8"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20044810}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000080)={r7, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000380)={r7, @in={{0x2, 0x4e23, @broadcast}}, [0x5, 0x195, 0x9, 0x4a4e9a7b, 0x9, 0x9, 0x0, 0x9, 0xfffffffffffffff8, 0x9, 0x9, 0x80000001, 0x80000000, 0x72, 0x80]}, &(0x7f0000000140)=0x100) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f00000002c0), 0x347) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x3, 0x1f, 0x0, 0x0, 0x1000, 0x51e82, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff, 0xbeb}, 0x10000, 0xfffffffffffffff9, 0x5, 0x1, 0x1, 0x6acb, 0x4}, 0xffffffffffffffff, 0x9, r8, 0xd) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:52 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00\f\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@delqdisc={0x58, 0x25, 0x100, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r10, {0xfff1, 0xb}, {0x7, 0xfff3}, {0x3, 0xc}}, [@TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x8, 0x6, 0xd9, 0x1, 0x4, 0x2010, 0x4}}, {0xc, 0x2, [0x3, 0xf7f, 0x101, 0x6]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1f}]}, 0x58}}, 0x4000) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x280000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) 22:37:52 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000140), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/38) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030000ac415fae442715cce890107005a379fbd8330fcb3899465d4ae00a807930000000087d7f7"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x14022, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 653.231153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9996 sclass=netlink_route_socket pid=2390 comm=syz-executor.3 22:37:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = fcntl$dupfd(r6, 0x0, r7) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000080)=0xc40, 0x4) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xb}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6c6f03003000"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xf74, 0x30f03) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x7f) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) get_thread_area(&(0x7f0000000080)={0x9, 0x20000800, 0x2000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:52 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 653.465582] XFS (loop5): Invalid superblock magic number [ 653.745173] XFS (loop0): Invalid superblock magic number [ 653.751093] XFS (loop5): Invalid superblock magic number 22:37:52 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x4bc, 0x0, 0x5, 0x401, 0x0, 0x0, {0x7, 0x0, 0x8}, [{{0x254, 0x1, {{0x0, 0x101}, 0x5, 0x48, 0x800, 0x9df2, 0x27, 'syz1\x00', "78011c30a436b164d4ba9b38d243df833345dff9c35e6e6132630c4c81b96cc0", "5051826657dd96d7f80b44b7c1548186975908b7bca323d4fba4502cca8b9c3b", [{0x2, 0x6, {0x3, 0x480000}}, {0x0, 0x6, {0x3, 0x1}}, {0x1, 0x3f, {0x2, 0x1}}, {0x5, 0x44, {0x0, 0x4c}}, {0x2, 0x6, {0x0, 0x1a2ca598}}, {0x7c8, 0x9, {0x0, 0xc0}}, {0x8, 0x2, {0x3, 0x9}}, {0x7, 0x7f, {0x2, 0x4}}, {0xfce, 0x1, {0x2, 0x2}}, {0x1000, 0xc27, {0x0, 0x4}}, {0x800, 0x2, {0x1, 0xf39}}, {0x1, 0x7, {0x3, 0x10001}}, {0x4, 0x3, {0x1, 0x4}}, {0x1200, 0x3ff, {0x3, 0x3}}, {0x20, 0xff, {0x1, 0x200}}, {0x4b9, 0xde1, {0x0, 0x1}}, {0x8, 0x81, {0x3, 0xdcd}}, {0x1, 0x8, {0x1, 0x1}}, {0x6, 0x8, {0x1, 0x3}}, {0x5305, 0x2, {0x2, 0xfffffeff}}, {0x100, 0x7, {0x2, 0xd61}}, {0x400, 0x5, {0x2, 0x80}}, {0x5, 0x1ff, {0x3, 0x3}}, {0x0, 0x400, {0x3, 0x4}}, {0xffff, 0x3, {0x1, 0x5}}, {0x23, 0x8, {0x2, 0x8}}, {0x9, 0x3d, {0x2, 0xd8}}, {0x1, 0x3, {0x2, 0x80}}, {0x4, 0x3, {0x1, 0x81}}, {0xfff8, 0x401, {0x0, 0x1ff}}, {0x6, 0x6, {0x1, 0x1}}, {0x1, 0x2, {0x3, 0x80000000}}, {0x4, 0x6, {0x1, 0x7fff}}, {0x40, 0x1, {0x2, 0x7}}, {0x5, 0x1, {0x1, 0x400}}, {0x9, 0x3, {0x1, 0x5}}, {0xee, 0x0, {0x3}}, {0x0, 0x7, {0x2, 0x6}}, {0x2, 0x100, {0x2, 0x25e89b77}}, {0xc6, 0xd, {0x3, 0x7}}]}}}, {{0x254, 0x1, {{0x0, 0xffffffe0}, 0xff, 0x4, 0x7, 0x16d0, 0x1f, 'syz0\x00', "21d46f7f4458553c0c241143ad57b6bdab0721436df395bc72879ac209e2b6ef", "aa261508868bf2b5bdcb9a2951dcd2b170a82cf483a974ce66f4c7dbe7c09727", [{0x4, 0x7, {0x2, 0x10000}}, {0x64f, 0x2, {0x1, 0x2}}, {0x4, 0x4, {0x3}}, {0x7ae5, 0x1000, {0x0, 0x20}}, {0x0, 0x2, {0x0, 0x7}}, {0xce5, 0xfff9, {0x1, 0xffffffff}}, {0x2, 0xffc0, {0x1, 0x55}}, {0xffc1, 0x37, {0x1, 0x7}}, {0x7, 0x4, {0x2, 0x7}}, {0xa087, 0x4, {0x1, 0x81}}, {0x40, 0x1000, {0x2, 0x6}}, {0x400, 0x2, {0x0, 0x3}}, {0x6, 0x54aa, {0x1, 0xe77}}, {0x9, 0xffff, {0x1, 0x4}}, {0x3, 0xfffc}, {0x7, 0x2, {0x0, 0xf9e0}}, {0x9, 0x0, {0x2, 0x4}}, {0x4, 0x8, {0x1, 0x2}}, {0x6, 0x1, {0x1, 0xffffff01}}, {0x3b09, 0xb, {0x1, 0x127}}, {0xffff, 0x4, {0x1, 0xfffffffd}}, {0x5, 0x5, {0x0, 0x8}}, {0x5, 0x401, {0x2, 0xfb5a}}, {0x1166, 0x9, {0x1, 0x991b}}, {0x3, 0x81, {0x3, 0x7}}, {0x19, 0x5, {0x2, 0x2}}, {0xfff9, 0x7, {0x1, 0xffff}}, {0xff01, 0x3, {0x2, 0x4}}, {0x2, 0x40, {0x1, 0x80000001}}, {0x5, 0x401, {0x3, 0x7}}, {0x101, 0x3f, {0x2, 0x1}}, {0x58b6, 0x40, {0x2, 0x3b}}, {0x200, 0x0, {0x2, 0x401}}, {0x1, 0x8000, {0x0, 0x4}}, {0x0, 0x6f, {0x0, 0xb21}}, {0x4, 0x1, {0x2, 0x400}}, {0x5, 0x7f, {0x1}}, {0x4, 0x6, {0xe28914d52ec64d5c, 0x3}}, {0xc2, 0xffff, {0x0, 0x2}}, {0x3, 0xf47, {0x3, 0x7fff}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000080)={0xffffffff, "5ea631d00201744726a3540b1509fe8b4cd745642ac875cdd062d4c8f075e618", 0x2, 0x0, 0x1, 0x40000, 0x2000402, 0x4}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000dfffffff1f8647c2163af0fb6400000000080001004745e94e71f5ce238e738da8b2484751db6eaa16f75a71521f0c1e3939882bf196c8f5ec56b6f68fcea331e076f01802874aa74bc2b9d502adb8b02e32de03000e90de64c13661d5fad9e60d6825ad622afbe55d22c699fc0c74bc5d16d8130bb2fd23af3d3395ef66bb7d82d458db94149d30adc0c09d0f89060e8888066f31b1d31286c7aa76c87f6b9ef3dabf237e36b6e82eba1dd6f3b18b41fbe7a3ba331743045c0976b199bd0dd1c946fcf488d2cede1b40811e9fa03fadd2fa8a7fb1ea99a72c758288526912b4ad0d76e69ac588942ef57bbb48b6"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) getpeername(r3, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000380)=@generic={0x2, 0x2, 0x1620}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) recvmsg$can_bcm(r7, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000380)}, {&(0x7f00000003c0)=""/118, 0x76}, {&(0x7f0000000440)=""/6, 0x6}, {&(0x7f00000005c0)=""/141, 0x8d}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x5}, 0x42) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:52 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:53 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x13, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x5}, 0x4) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000140)={0x8000, 0x80000000}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r5, &(0x7f00000002c0), 0x347) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r2) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = dup2(r7, 0xffffffffffffffff) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:53 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x4, 0x0, 0x0, {0x7, 0x0, 0x0, r9}}, 0xfffffffffffffe6b}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x1, 0x40, 0x5, 0x2, {{0x2b, 0x4, 0x1, 0x31, 0xac, 0x64, 0x0, 0x5, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x1b}, {[@end, @timestamp={0x44, 0x2c, 0x10, 0x0, 0x3, [0x3, 0x8, 0xff, 0x20, 0x101b, 0x7600, 0x2, 0x8b, 0x80000000, 0x8001]}, @noop, @timestamp_prespec={0x44, 0xc, 0xd3, 0x3, 0x7, [{@multicast1}]}, @timestamp={0x44, 0x18, 0x68, 0x0, 0x7, [0x8, 0xfd9, 0x5, 0x2, 0x5ac]}, @generic={0x88, 0x3, "f6"}, @ssrr={0x89, 0x13, 0x97, [@remote, @dev={0xac, 0x14, 0x14, 0x25}, @broadcast, @private=0xa010101]}, @cipso={0x86, 0x2d, 0x3, [{0x0, 0xb, "4cf1fa6c1e37a2860b"}, {0x7, 0x3, "a2"}, {0x1, 0xe, "d66bff1f75b44028b9219a27"}, {0x6, 0xb, "b3563f2a49451e76c7"}]}]}}}}}) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)={0xc0, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xaf10dbf04ca742ad}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x8000}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) 22:37:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000580)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYBLOB="000000800000000028ff75060076"], 0x48}, 0x1, 0x0, 0x0, 0x4004801}, 0x2400c881) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000002800270d000000000000000000000000043e8d42eae8ce1699ac65d48229ae1263df95ca6847cf2494a022221e671921c6162392ff73196cb832d38a522e0d80c90e7215206c59484a6cfd2e4c9182448adefa0ac59fc819f401ca9cd610b60c429b06bf3a63593f2174dfe28c197eb5c412ff3b116c925b48bef3d4fa5e714ede6b052ee2bf1807bb08b11c5dc426af132a5bcc0ffcbd6c7e22770d35247ae23986e2d3cb377a96dbfc033b7e61eb0d0ccbef18745719319d34b810467743259febc6c521135e3b77396d178f324ea892b92f61a5d95cbed135ce766523e26644076111797819af516418", @ANYRES32=r4, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0x400, 0x0, 0x0, {0x0, 0x0, 0x4000, r4, {}, {0xfff1}}}, 0x24}}, 0x8000) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000640)='/dev/nvme-fabrics\x00', 0x8002, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r5, 0x80044dfd, &(0x7f0000000680)) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$nl_route(r6, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x48, 0x10, 0x100, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x1010, 0x8a00}, [@IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xfff}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x3}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x1d87}, @IFLA_GROUP={0x8, 0x1b, 0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x40) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x10) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x410000, 0x0) ioctl$BLKIOOPT(r7, 0x1279, &(0x7f00000000c0)) 22:37:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80a000, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f00000000c0)=@int=0x9, 0x4) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 654.343354] XFS (loop5): Invalid superblock magic number [ 654.454107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2598 comm=syz-executor.1 [ 654.551521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2598 comm=syz-executor.1 22:37:53 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:53 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x8, 0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)={{0x108, 0x80, 0x40, 0x3af, 0x39a, 0x100, 0x32d, 0x7ff}, "b6d410a1f91a2454c2d2d0c8e57b4ea015c6d3acc9bcddbee506714a527f510a16dc6d5822c44d6c352f6803cda64e945290ac90", [[], [], [], [], [], [], [], []]}, 0x854) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:37:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002800270d0000f2f59cdb1737f711479d", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:53 executing program 2: sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0x88, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000850}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574688e1469ad9c0175d859193e31a460843e2a7e1301eabfb42eaa14833ad6db1c593086eb33c5e0ed2d429bfe7cedb7b2afae4e215e99f40f440abffffc3c59628dc1c1c11df773c494d1a8ca0a6e698fed1eaac2"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000008900"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000031691b8e000000000000aa080000000000000091239054644887af22b2a002b34417bbf6be4f1e045f9c6a7686263290b853f332ac4c3c1cd4ac6c73ddc7b94cb29f9b10c246fad6acbf168e88b99c6040133e6577efad86aa3986f3282b55251943f5319a28020627eddff3c27f3845cdb442ab0421d02e82cca3ea81354f5cca7071ac1d3fcc04b34375456dcfdba30995f7c270bc1004a8e16c91380a516849509a04c7d0d0"], 0x48}}, 0x4090) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@newtfilter={0x58, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0xb}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x28, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x9, 0x2}}, @TCA_RSVP_DST={0x14, 0x2, @ipv4={[], [], @multicast2}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x5, 0x7}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000055fe9c6fad96413c3c218f2ed82b8a406691df25b41f945402da15678b302c157ee3e3663ade9982ff64082de355690efea14f18680d7edaab0c4ed20c9216751c45dc369800c64a8c9bd9f1b821c8712fe5d617a88159ff0af8753d16458a758ebae8e17a334b3e91e3920f1a600c51ad72f500b7540d8d5959aca20d30e9511bd5f0b69259226824e4747b6a09c32a34895561feb9a30e72ca0ff93565", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcdbdf252000000008000300", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100010000000800010004000000"], 0x3c}, 0x1, 0x0, 0x0, 0xc804}, 0x4000) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$KDGKBLED(r7, 0x4b64, &(0x7f0000000080)) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r5}}, 0x24}}, 0x0) [ 654.695898] XFS (loop0): Invalid superblock magic number 22:37:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 654.935187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=137 sclass=netlink_route_socket pid=2672 comm=syz-executor.2 [ 654.952492] qfq: invalid weight 458756 [ 654.974528] nla_parse: 164 callbacks suppressed [ 654.974536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 655.000275] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 655.019105] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 22:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) shmctl$IPC_RMID(r0, 0x0) [ 655.033029] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 655.051360] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 655.066118] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 655.103183] XFS (loop5): Invalid superblock magic number 22:37:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) 22:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) recvfrom$phonet(r0, &(0x7f00000000c0)=""/111, 0x6f, 0x10160, &(0x7f0000000140)={0x23, 0xce, 0x81, 0x1f}, 0x10) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x420100, 0x0) ioctl$CHAR_RAW_ROTATIONAL(r2, 0x127e, &(0x7f00000000c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000300)='./file0\x00', 0x400080, 0x4) bind$alg(r4, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f00000002c0), 0x347) ioctl$FIONREAD(r8, 0x541b, &(0x7f0000000140)) [ 655.208640] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. [ 655.244095] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 22:37:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x101, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r7, 0xc040563e, &(0x7f00000000c0)={0x0, 0x0, 0x101, 0x0, {0x0, 0x6, 0x9, 0x3}}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0xec, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0xfff1, 0x3}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xbc, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @private0}, @TCA_RSVP_POLICE={0x48, 0x5, [@TCA_POLICE_PEAKRATE64={0xc}, @TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_PEAKRATE64={0xc}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7f}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x8, 0x8012}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x80000000, 0x6d5, 0x3}, {0x3, 0x8, 0x6}, 0x11, 0x8, 0xed}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x0, 0x3, 0x7f}, {0xc5, 0x8}, 0x84c226a12e20f00e, 0x1f, 0x9}}, @TCA_RSVP_DST={0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}]}}]}, 0xec}}, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f00000002c0), 0x347) finit_module(r8, &(0x7f0000000140)='rsvp6\x00', 0x1) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 655.298854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 655.332710] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 655.383121] XFS (loop0): Invalid superblock magic number [ 655.426591] XFS (loop5): Invalid superblock magic number 22:37:54 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) 22:37:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x8c, 0x0, 0xff, 0x5, 0x2, 0xe5f9}, &(0x7f00000000c0)=0x20) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="5600eeed0876637cfa3a7886", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001100270d000000000000000000c1b240", @ANYRES32=r6, @ANYBLOB='\x00'/12], 0x24}}, 0x0) 22:37:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, &(0x7f00000000c0)=0x1c, 0x80800) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r5, 0xc0506617, &(0x7f00000005c0)={{0x1, 0x0, @reserved="667457a4c7cffa6580a5aa129d0c735bb7fa8a35dfbfcbca16fd16ec952cbc84"}, 0xee, 0x0, [], "51825f0d304801f749a8adc7c0bf1875e89a07e89b67b0cc4f4f46ccfa44e075458fbc4ef326521901bba305bab14003b7a7695434a02332e5b6846f1ae68304d03eaa1723823e83f51b1dbbf3110ac8dd0c77439f6f1ecf26420abb7444fa23c561dcf8e728a06f20c9ae264f4b4308d4cc0322f96a5d8f3c66b390c31ca06a0d9306cdd6adf11e985d64418107bcc1e5708e989e870fafb7b8d26af090dd156985b87c1ac69aa21fcf2c10bedb48485027246d7314754cca95e48abe21561f8228836c50064286d87265ef95fd8f0742dc0768b9fd9dfadbcb5f1f2abe74b3d3fb69e3f5017733300bf250cae0"}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000007c0)={{0x2, 0x0, @descriptor="f5e8e30be4b4c18a"}, 0x1000, r9, [], "55b4b5a089b6851f2a69fe8e5feff099ea4700a4efd031afac4869b7011536436a59a259e7c306d0f48ea778c6e5221556923dffe3a48abf588f6e05aec471381d22ee41a488cb782008243851ebe74cbb1c68f13ef28eaa22761c0c14832a9f522200a0d26eab1885a2af5408b6cddbb1f89a2580ba6f8da6fc27dc0d0dbc94baec83f4515255e6e209257521f334b3c9e1c30af5c0b65f4b237c7886f601dd2d1ec2ccf0eaba0c29b1f59863398c840cba1edf319abc181468cfa74cd3d72d88ed9733981d110fb5b2eb6c15ab0a4871626533b04b1652f36397c7957c1e3ed92cf91527b0de27ef354ebf56ad17ef4ebbf4cc1b966c60a3326ce6c3729f8367c4515a6bc6378a87329f32e017e70b49221359c16823a7969dc98d205452eadfb56ae3a48e2e8b3e3a0ec8adeaf942271f1a2d65b686fa74ff17147acd96db76f9ce525429057126cce613cd7dbfd6b8c3cc00deb1fb26301a92591810b6b263b93354876baf139f3d5b1ffb660689ac826b02981c1759e04562c8caf150d5c44c604af1cf09b55aa0400852539c78e2ad12d50e530ef9eb9dbb6679d89a9d08fd81e73dda773acf650aff7d5734abf550a0004fe506d8c81dc30061414604c8ab293caf57ddc6d388accaca1235b3266f1637a2b8e6bf3604fd2e74ea770d6a6accc3c3edb1c9e2b6803731a210250cb0d9ea34bf0e4268703c0a813b1da687ed43037cd24f3eca93c249fc2df857ff828bebfc8a96639a460ee77b313f0b78bd3689a68cfd073255be20aca27dd5572fbcad697d01947bd4379dcfefc600abe01db7284181e51a9ebe8cc74ec900bf6cfa45858534f7c2f0ad659dc5c6158a6d6356b764d126902fa8f14908aaa1fa635e2225b81b5b5c08f45d3531aa71e24fdc52c69fed0ce887bd29aded06a668014c43ef7c8f6144c9a6efcdc38bba9bd1efb75ed9cc2e0110d50c51612556ba71efc0dacc859ab1ec721f82a7f786cef5f1736ffbfe8b7b7772cbb62e1df7fc62d0aaf71ee583c3fa65bad787a6efa0a964678af89ec9c95c7a1f22a89d41ee2e75c184794cfced5e2e072d32803d44ce7ccad5eecc37f45e08a0440ec02960a6cd749e38eb63a79a3a0e1dd35a804496b523090e9a4c1686b223928579b06edef1e7d4bcdef06bc91c549ccbe056015045e35d47a4f0c9ca948e4be7de15bb9fad384e94a12518868582ff66d130c510c6660cbc0fbc2a61238e7c85d010379ec724bedb0b68c359bdc8469bf28a56654702b153445a956bd0a2472e74d191fd7c42094d99620b009c37f743c87d9f3654a06cf5edb62e2bdc736c8c9a447d67d2cd695afffc49946aed1d0813880feec5762b89df24d70c0b6d868931a30939f78a8f8755dfd0de3f3cbd0703e2445dadc27a01d33f240403b70d7400899db37f72ba99f18a6684c3f3f8bd46a63e7015b29cfcb41b62f75eac5e61de758de4cfccb0dcc79454b75e69e28a1288d589e37ccc7bffbeeb53640520528780ef5ace57dcf0cdd05114b4260d0a92e41b3aa1b4d48585c1a7ec014df6acf1ed07db3b79a36b8a0c6105d415ca688d6602fea32a0b9dd26cb8dad082aff7bdd1b250fcc3f1a320aa0238489ec0bc9148cd6e286db1bce23dbd82796a6bc37149ba1212b07fb3e7c02ecd089f910e2e1fb2aeb5a4838b32b401ca8c6386c04387e99a7cd926a1ecafa7dc917a3833a125b2e1be89313a808f2cf286b3f6c8a90eec6d11eb2f46e43b2dcc69409f30fa14f2e58cbd297d933d678e07ed29c3ae6be490a09c3e09631808caf3d07b992f9b5a8c6add4b86c8f39a3c9115541d1301172e30f07e22966508d517e15356e7ac6b7f583fc7af67420cc6831498ff820feba633da9ab1ffc3b9510e3c8cc742272a54c2594f7ab9972dcc33d6cfab4b811390fc262e2182721fd6f32e8076e935bc83a611686fa37e6a6aa618248a92ee0cd0734163f6017a07f3e9ed5609780268677406d18bf03730b45cda233a6cff27be55fd2a8fac4e07d9d616364c1a729afff56ff723a3b18ac35b54867023eabf5fe7033824b14b3b864c8cca57f00998b0018996355d1711ca6b0e000843d9c379057d643da244e9e9bbcc4ee95200733370c33f74a07aa6fd6eb16e13018c126f28960ac3df9f3e03c6fe31f2414ea238310d912cc09244e53d605d15ddac032c5ad3374a831187042aaf1d68a623efdda45b795d466d7113429d6a85f9f1e66309e7c61d8e38204c03401b9be2c66c9868addc6ef123c7bc081cb08c50dfdbaac67df34105201bf0bf2b9416528af229439922e23de56a7d8252905eec771a8c4f56ed2f04f836c8d389a236136778ef4c3fbd63b5ecce6cf80a40dd8a685d37bf50f69f5c424be4db6ae4b61e8839c9732a83af50543a0826ccc22839214ed57998db822f05b75fd925bc14d626e9628af2a10b9169260b09fc838829a2599573f22db7df5f4f59692bca91511147ece7b639477b5fc663542790bf320d1285e3ef762735cf48af9d00bf9d33b43ac713ac223d77e069ca674cbf757a2ae81f1157af7edc676ed5607693fe3a8f8dc1b68c0eb8dab0040db72177c776929000c8d4a25e99743adb54e2ce6599ecd7732133655a5af6c7283a2d04c907c6570d35a6b73f87faedbb8d84b6e028ab6c45871104bb359f5cac051449a71769b82219c1bbb84745bb825ed5a8780b58f772cb1706557211bfbadc6c882546fe0eabcae7f1bc266e3ddca885d18205b5bc1f900fcbaf36890e7ebbab163037321836efa14c0622702a2e37a643ac5df5a5f4e7e1087f00996f5d77fdb04f02e3f65ca4ede9a285985d0ff95f05fc8a910ace9b457e1dee0f14ac338c65379078cf9ce91146e69683389c798a73ab32cd0d08f5db121ad8c092a3032470e387f31322cb4bd1d389b367b65731a4af7e13dae9a8a78d0c95ed31dae3607ed7d7fe09933e1bc9b0fcc49abfda060acac7e9c601c3074843d94071a88cc2f6d0f1ac5bff092cf644f998f98e276b204518aafe891bc6d278d1cbe02b1bea9a938c2bd8c619bf5c88cdbca3875b227cefca07465d7e931f0226b959fe20c95ba269f2bb015a9234948d935dc3fbf8086bebb3977659a656e2e0ee2b46f959122262e05f829d8451d0cf527aceaa4fc168ba295b5bd0118389eb8cedac81c70530237881f54ad4110d78376243e61a34c4b77ad3439b61509e8f5304561a3a3d9064e7c8ca1f91e4db6039f4f016184284bfca4142c76cc1973ad08b5f693cb2adcd80a386a1d15d421f8f1f6cc9c039470970559d146c57623dafbf70b2dab9cd52d8a84edcd55e6d6ce5469a05aef1d0e81feaf14a77624510c228eee66bc63cd7da6eaaf03a2e7e1321ef0fa84c602a842c736fab2c6a6e25636360dae6e19a7000c90fe1ca45afdf40a140a2afe9d5231aed8e5328783738d2ca5aa8d3eaf2815b070e3221f1b9766094ade0ee2ef58f4065dd34bfec8f8b55bc98f100c20f3143c1cc1d11e6ddddcda9b9cbaf393acece26e693a14086702cff7fe2f3f7d9d1734c741d8bcacbcfa70f4c82293f11881aea4d0d5029831e37f23faf6f3f7bc2c5269e2b8d1e770dcd30addcecbc4345200759d9ea411b656eb8b09c2c487ab6d70030e41372e30764ffc306ade810a372748a67aa505edc8eed966a7a0f3c2b00cdfa8bfd0fdcfa9bbfb8d0b8d6435f5da644935af34d7c80927a276ae58248b8bbd402915df8c8495fa2785a16f809e4e364860354073ea6c4f334192fe71d984e3fba7c00f3218d1aba917f965fae4bea71b76ed6db9c111a85a12087c1d32dae2baa1dd974fbd291a461b29db1dc485ccb167b64caf9e8092170d6be20a1eb406f092a04e62884e3e3031145dab92fccdc92ef89b8a9bdf9c5a46543c666a69540a6f0290e4213b45ba25fe2c2e017d0cb083c8ef18428a52f15ddcca903441c45df41e5b7177cfbee38b7da2b2e593b8044826ffe6539142a06ee0f1f24a5a3a4de2abb116ddf3d63005e9503a41133d142689d5e70f510808a0cde0c882568bf5e78b7c9963ed1d4b09e3ec6b7fe44695bdb9c9e30fff1d9f20d493b2b2727c5d5783653877171a8936aefa44c89fa8240c42897c954a8c9de2b07e379ad6a8435e34573965d128eb36d603958733563ac12df3ea2e0fdcc954b4ce8375699c74716db43c0e2ab203393f06fe0be1ef9a30c62e93724c0781027ef758b4bf24d0645f977ebe9f8b26ed001434d145aeb9c73992a4a8ce5becae4acb5db833faea7d79e69f84afe9b748e3a67e15335e9681e2761e00d6e5c2e8c52641ee82603ecf9f6045119d6861d44d25be969215004ccd1700dd314eceefac70c6eef2558922a5f4ccc0ff2dfd94029ddee4a8b36461eb02b3e6c5f2056f8376676f186505c0d336c057f4292a9ca1d66277372751087fcd600887d8144ef19018cde9c6ff67953a96c61accdc5af508f5b328101b017939bc23f220dd5dce5a57c4dbadf96b2a730fcc817af76c73bab56ee37d22f8642210184f47c08c3aa8c39266dc161bbeed9d96299cd856c8fab45de9a2d223a6358c3535dd38a191539279c93218b01052b3296c639d2261ff95a6faf78505a4c371eb0dd2ccb9db71edb9b5415689c67bbb76447773d60445a00c6f4f71c7eb33b7a13d09fbcfc4f0e94907fdf064193223372b2cf0fcc3e2ead7bb43d7e50c4efed5b3b465ddc65734729d82a7b09b3f9f5f0b718fd33d5813c3bccb8481ce3080ac5d496441c068f84848b32266f2cf33ff2c7017f39ba177e47bc8e8debfeb895aaae5870767321ab43b852b7f63f1453fb77b5381f1b485bc85ee1f26677b8e2808bb3bbd4ce7434fed75f2c6b28007b00a3226b6adf8ab7b01efc47331118260c49a2bb54d4c4d0bead954be74fd860d358a51b478a618a7d8fc99dfd5a1fd9ca3b8cdbcea8bad36da370a5588eeaca35fbf03d79bd62c2221fd3e5b499cf80db5fa564da0999a6c4f3e45c95cde395303e909a2cd7109111ff002747da0a9bb531ddc28a497cb19a8d3c0ef8c1741d25330333ad6b30cdb28923ec692bca47f4eac2f7fe41ca799fc8ba8277c8b0d9e50daa165e1fb288a115749e1433fd86dbae82fdaae9b1047be97390e785dc53086149247e83e7e3b96df3514dd10c00ae4ef58ed19ed900a54ba88883f050d26b31cc9c43d15d8acc93bd1f88664ce768e865b0002b89388120f10c51b343c8d55f64f3e5b2bdbfc0351d7edd97676cda20f91ba3d1567b3e017b097b9f1698689ff36dd9bbfc384334bd1d48bd5061dd549d953549163f27ed8642f0a7c6808697013b2b5d04ed556f538838f4512aec43d1cc221f3ab07c01b5868de49598978bd66da0856087dd97236b9eb7cf6889ad475444b81037ffd260bb1621b36c3583b64951368f5a4bc8af76715185c77af9be1c49e693cd60d31424f1945e610d2dbce817f89b3928181814ceafe760b612d847ce7cfa4dddb67d1005cfea62cd52ece24104ea77f97306f24322ffef23a81e45748d187762997335e470057fb27e5ec1cc004b54b4e2c9f94d73ddab0eb18ea802b6188762f70fc7d3825c3d9f80e698868167c5053a690def5abd099c6ca381f97536414af25c8caad1d75933dca033d5bb4f9e37cd8e67083435c147c01069e0fa673ff096ecb35d5c114cd8938dbcb07da4de9e09dfecbaa989470b3953d60aa09103c4b59cbfb1396f51cd0faf3babadd6ebce7949e897a50aa2e13a472b4165561e3473e20aba7717a3c12fc88fdfa6438ec6"}) writev(r8, &(0x7f00000002c0), 0x347) write$evdev(r8, &(0x7f0000000380)=[{{0x77359400}, 0x1, 0x9, 0xfffffff7}, {{0x0, 0x2710}, 0x1f, 0xf801, 0x8}, {{0x77359400}, 0x17, 0x5, 0xfae}, {{0x0, 0x2710}, 0x17, 0x7, 0x100}], 0x60) getsockopt$IP_VS_SO_GET_SERVICES(r7, 0x0, 0x482, &(0x7f0000000140)=""/20, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = dup2(r6, r7) ioctl$PPPIOCNEWUNIT(r8, 0xc004743e, &(0x7f0000000080)=0x4) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000000)) ptrace(0x11, r0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0xf000000, 0xff, 0x7fffffff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909cb, 0x3ff, [], @ptr=0x52e6}}) ioctl$TIOCNXCL(r2, 0x540d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 655.520967] XFS (loop4): Invalid superblock magic number 22:37:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) 22:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x7346, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), 0x0) 22:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev/loo\x000\x00'], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), 0x0) [ 656.210259] XFS (loop5): Invalid superblock magic number 22:37:55 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$KVM_PPC_GET_SMMU_INFO(r6, 0x8250aea6, &(0x7f0000000080)=""/30) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$PPPIOCSNPMODE(r7, 0x4008744b, &(0x7f00000000c0)={0x2b, 0x1}) 22:37:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) setsockopt$RXRPC_SECURITY_KEY(r5, 0x110, 0x1, &(0x7f0000000080)='\x00', 0x1) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0x288, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_SOCK={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x27e9}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xbc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "f44db87e65388529ee6aed9ede7fe78b5240c6b007fdee7d4f6ea7e8315315"}}, @TIPC_NLA_NODE_ID={0x1a, 0x3, "7a2861a3a395d36e408e90c27e88274de925686ad19e"}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "67bf6a023e07adff1f2533bb23bda814f6ae84d9cb"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf4b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x174, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0x17, 0x3, "efb469b7eae27e40e6fbf3e0fbb6e836a28def"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "7c8e26f0cd583f02ce8e64bc9c5cea48020c59b01257c930a4d011ff1e69"}}, @TIPC_NLA_NODE_ID={0xad, 0x3, "dadeb76c9d733a4dc36e755f5732a8d5ea1a82819b7d1efa40225cabba33e39cb457c18fcecfd4af10a6e3d10eec07ff2cb79e8074427f203388e556980757cbbb01abf31a55e43023d7a7251b48ada8b1f605cafc9a978d9b4a75c2b6f678f8ccb7242bdf8d846083509f0172ff2b1773091bce3a6ac3220c0e1541fa67e43473b855f3fbd9cb052186c1ae9f02832291ef3833e27f77b216bf56071873d759811efc5aeaee28b1a8"}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "2922b7bb6b62a101c760d47bc9bff4151b1b7aec2134f140c9e6ab94d2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) ioctl$KVM_S390_VCPU_FAULT(r4, 0x4008ae52, &(0x7f0000000000)=0x8) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) faccessat(r4, &(0x7f00000000c0)='./file1\x00', 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), 0x0) 22:37:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='p\x00', @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000380)="e9284b2bef65ee0effb8b7c2f9cb2e70697b33e0f93b8e641889e1d46e0eafd63cb65c4742d63b74b50b27f57612ba04b62b011722ca9191b1475427c63dec0778c066f64dc887dd9f13a90bc490ce41b44159ec76b7cef8cc9c01c56886fb68481f4fd8ff7c1ab43af1f97590c396be4286388f28ba679ac47d24ea87c429703b86c3c47d4bc8c81459c0f2c48b4eb6155d87321f5dbdeb35b94ac53f7a265a5bff271cc602735d2a59a066d89f40e046a7f4e2033f584b", 0xb8}, {&(0x7f0000000300)="3f59aff2b2f2d4173cec8b6dc3dc89127cc6d6f81c4c856fda2352bf702f27437957872ae53641ae8a6569a5a709e9f6fb861d96ce4f686fc5b27073965c23", 0x3f}, {&(0x7f0000000a80)="699fa72dbb36cd62645492f2c0ee15f5b4a218b5f5c95358b3822acaa3fd6268aa3383c940d5975e7b77c4000000d5c915a56df2b5bf50c491dbb60b7c61ae7d7551ef18e47af534e4fb94f1dcbd9baaecedb3881ee3ba07d7c6a40b6b8b30788a0df53dc9b889efc6f405f9760ae84ef25363a45ca20e361fbe19c92b8d697b3a9a7d7a28ac70ec2d35a716080762ba380dd0a6e8d8e6d9293b959cbb20fcfbe6512e7845ff0ba2b551ccebc46743c47e8b40896a19733680c244d0d310ace96c30a4f4a5bfead8dc0803b29c23e6cf5052ad4d7328c5ff446b7158a81e2a31f8fd91cc737b32e3f24230f293fa58", 0xef}], 0x3) r6 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2807000000000100000000000000000602000000", @ANYRES32=r9, @ANYBLOB="000000000a0002000c80c20000000000"], 0x28}}, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)={0x298, 0x12, 0x300, 0x70bd2a, 0x25dfdbfe, {0x1d, 0xfa, 0x20, 0x17, {0x4e22, 0x4e24, [0x10000, 0x5, 0x1, 0x214], [0x5, 0xfffffffe, 0x1, 0x4], r9, [0x1, 0xffffffff]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0xdb, 0x1, "422230b59ef66778523ba2c195734eeb44e042e9a04efe625226725411ae590c6c534c28500e4db461b7ec6c68ef2f755e8538c2a0c3ff471b3b32afe836b6a8786a987cae4831ee0c36933ae8a754b5c0f4a4c1c02d2862ea9bb132aeb9c03ae4c30db73151796408abe346b098fb25f6caf15a5fc7303544f20dce6dd9c656cdf762f853c6513bcf4a01eb259f7c752aa95f9894083fb1b4b258648019087f612ab21131e13ff7d3bdc0cb68ecdda2d1152766fce099210c9b852cf2b3d7b896254b76cdc8512eeb7fca4bc650017c8d6a7ecb0c8d2f"}, @INET_DIAG_REQ_BYTECODE={0x7a, 0x1, "902a0c783884d2fa432b0c13dea77ea23a91618c3c9af1a97e16f7d43c5ec6638771b30b0167feabb8d8c9eaf7a1b2c99e655b8f195e2c7074bdcb74ddc7bcf1d0f5efd7ab7a55bbcfab9247239395dd7c453a7fb377293a0d902e7f16a21daf258ccfa6ec6dfabf3567310051c707c2fc672b687959"}, @INET_DIAG_REQ_BYTECODE={0xf3, 0x1, "7f9c67e01c379b8ccb23b6655eb70317d9131ddcee389f3aa83c5511606511cdcfdcf2f29e091580b03ded8ea3985e46d2d7e3d075c128fa83e93ab7c9c4317221dd1a313ff94b972641daa07165de6977dcb85bb9c5aeee7dea1c2d2e4b8d403dfe16e86f73b8e9c6b6ed27049b4a949acd757307ddcf1f1a8b0495eeeead0d6aa4966d794cd97be2a263796b5bdfb0db8d70f62a9d23a658e332485c3c2e253e76d889237329ecfeda9b5d6981ba0d33ecdb5bcc5a37670c09c33ddfe3b63559f90d5d3e67d2ad9e00f78f854dd07cfd75168b167e73b67c96347e329c65407f9739170c8f352e72902bce0df31a"}]}, 0x298}, 0x1, 0x0, 0x0, 0x20050001}, 0x80) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0x200, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x6, 0x2}, {0x7}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r5, @ANYBLOB="00000000f8ff00000500000000"], 0x24}}, 0x0) [ 656.550342] XFS (loop0): Invalid superblock magic number 22:37:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x2, 0x0) ioctl$KVM_CHECK_EXTENSION(r7, 0xae03, 0x7) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r5}}, 0x24}}, 0x0) 22:37:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_int(r3, 0x1, 0x21, &(0x7f0000000140), &(0x7f00000002c0)=0x4) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0xc0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x48, 0x28, 0x200, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, r5, {}, {}, {0x0, 0xd}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_PINFO={0x0, 0x4, {{0x4, 0x3ff, 0xfc000000}, {0x5, 0x100, 0x2}, 0x1, 0x8, 0x1f}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x5}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:55 executing program 4: mkdir(&(0x7f0000000080)='./file1\x00', 0x85) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1010, r0, 0xf9a4e000) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) bind$bt_l2cap(r1, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="00007da9011ae0fea79eb4f81404f8783205ff5f742d44760b82bb491b5f4e2dd94828c294205f28d8fb6f1f20e427dccc8b4b2dfedc6fdf1b6cf34a2e"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 656.843989] XFS (loop5): Invalid superblock magic number 22:37:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0x288, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_SOCK={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x27e9}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xbc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "f44db87e65388529ee6aed9ede7fe78b5240c6b007fdee7d4f6ea7e8315315"}}, @TIPC_NLA_NODE_ID={0x1a, 0x3, "7a2861a3a395d36e408e90c27e88274de925686ad19e"}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "67bf6a023e07adff1f2533bb23bda814f6ae84d9cb"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf4b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x174, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0x17, 0x3, "efb469b7eae27e40e6fbf3e0fbb6e836a28def"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "7c8e26f0cd583f02ce8e64bc9c5cea48020c59b01257c930a4d011ff1e69"}}, @TIPC_NLA_NODE_ID={0xad, 0x3, "dadeb76c9d733a4dc36e755f5732a8d5ea1a82819b7d1efa40225cabba33e39cb457c18fcecfd4af10a6e3d10eec07ff2cb79e8074427f203388e556980757cbbb01abf31a55e43023d7a7251b48ada8b1f605cafc9a978d9b4a75c2b6f678f8ccb7242bdf8d846083509f0172ff2b1773091bce3a6ac3220c0e1541fa67e43473b855f3fbd9cb052186c1ae9f02832291ef3833e27f77b216bf56071873d759811efc5aeaee28b1a8"}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "2922b7bb6b62a101c760d47bc9bff4151b1b7aec2134f140c9e6ab94d2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) ioctl$KVM_S390_VCPU_FAULT(r4, 0x4008ae52, &(0x7f0000000000)=0x8) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) faccessat(r4, &(0x7f00000000c0)='./file1\x00', 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6, {}, {0x0, 0x7}}}, 0x24}}, 0x0) 22:37:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000380)=@int=0x80000000, 0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NLBL_UNLABEL_C_ACCEPT(r5, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x78, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010176657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="cf428df6fefff2ff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) [ 657.101903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3000 comm=syz-executor.2 [ 657.143329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3000 comm=syz-executor.2 [ 657.150848] XFS (loop0): Invalid superblock magic number 22:37:56 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) setsockopt$RXRPC_SECURITY_KEY(r5, 0x110, 0x1, &(0x7f0000000080)='\x00', 0x1) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)=ANY=[], 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x22000, 0x0) writev(r6, &(0x7f00000002c0), 0x347) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl2\x00', 0x0, 0x29, 0x6, 0x1f, 0x200, 0x44, @loopback, @empty, 0x20, 0x40, 0x9, 0xffffffff}}) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r9, &(0x7f00000002c0), 0x347) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000440)=0xe8) sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)={0x6c, 0x0, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xfff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x83d, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000050) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xe}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x202002) keyctl$chown(0x4, r2, 0xee00, r1) chown(&(0x7f0000000000)='./file0\x00', 0x0, r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r3 = getpgrp(r0) ptrace$cont(0x1f, r3, 0x0, 0x100000001) 22:37:56 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) recvfrom$x25(r0, &(0x7f00000005c0)=""/236, 0xec, 0x10000, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB='I\x00\x00\x00T\'', @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500000000000000000f6f7bdd", @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000002800270d0000000000000000000000000d0c4fbb4bd3e27d29123d19dea618361d4e438b9fd53f51b8a2e4ee5303c13e57a32384d13d62b8968256b1ca70608476177e2f4876f6b1bd6c951e74f33c1311913b07e2c86320da7026c9513857fae1935b44c41c8e288d1968b4bcbdde2531", @ANYRES32=r8, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="34b46a00283e270d0000000000000000000000004b143fb636261509658fb3c4d51845160040e0bf7f82884b42941f37dc499005d30fcce78d239edac43d61850d48f1e428df90bc997eb0cbf9", @ANYRES32=r8, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r8}}, 0x24}}, 0x0) 22:37:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) connect$bt_sco(r5, &(0x7f0000000080)={0x1f, @fixed={[], 0x12}}, 0x8) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000009100005070000040000d6000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x11f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000200)="cd3d564eb0644a2d5d0efd669c1567e07a7a6402f18797c9c7640527984aa26b6a69f0ae9ebb87643ed503cc0bc57dc1e91ae45367853a8cb8a6a7d26f716e75ac78d7e4f258642c44e4176ba23a1b5f5fef8dd1451a9c5b0b4d0ec0c145") bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="94c6db7fabc99f4600000004e6ef0e17cc57a1644d74bceeccfe958eb946ffb419f949ad7695a90cd1cdac11739da60035c0aa8fc18d480d2958812fe24ab4abd404b325ee767c86c487a348b6792d45a2f2380e604c4513085ade911f0e7e114f4ed307be38db9c98bacefe97db492b5f92adecb99c121f54f316e562f86ecedfd1000000000000cd7dbf3369c7"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x2a072, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @local}, {0x306, @broadcast}, 0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'syzkaller1\x00'}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="00000000000000001b0000000a000100727376703600000004000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x8b8, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x888, 0x2, [@TCA_FLOW_RSHIFT={0x8, 0x4, 0x5}, @TCA_FLOW_RSHIFT={0x8, 0x4, 0x6}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0x4, 0xd}}, @TCA_FLOW_POLICE={0x86c, 0xa, 0x0, 0x1, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7d, 0x3f, 0x40, 0x80, 0x5, 0xeb4, 0x7, 0x818, 0x7ff, 0x200, 0x8, 0x3f, 0x0, 0x9, 0x6, 0x35f8, 0x80000001, 0xfffffffa, 0x3f, 0x1000, 0xf900, 0x401, 0xffffffff, 0x4, 0xffffffe0, 0x6d3, 0x80000000, 0x7, 0xed4f, 0x8, 0x3f, 0xfffffbff, 0x10001, 0xfff, 0x7, 0x3, 0x9, 0x6, 0x0, 0x200, 0x7fffffff, 0x9, 0x7, 0x3, 0x10000000, 0x5, 0x4, 0x101, 0x1000, 0x3ff, 0x3, 0x0, 0x7, 0x101, 0x1000, 0xcd, 0x1, 0xffff, 0x6, 0xc000, 0x4, 0x6c, 0xff, 0x2, 0x5, 0x3, 0x10001, 0xe7, 0x5d, 0x0, 0xef6, 0xfff, 0x7, 0x2, 0x7, 0x1, 0x7ff, 0x1, 0x7ff, 0x10000, 0x5, 0x49cb, 0x2, 0x10000, 0x5, 0x8, 0x1000, 0x21e6, 0x6, 0x7fffffff, 0x6, 0x416, 0x0, 0x5, 0x7f, 0x7, 0x79b, 0x4b, 0x9, 0x6, 0xd44b, 0xea, 0xffffffff, 0x80000000, 0x4, 0x6d2a38a, 0x5, 0x9, 0x1000, 0x80000001, 0x4, 0xffff7466, 0x3f, 0x5, 0x9, 0x400, 0x101, 0x3ff, 0x7f, 0x50000000, 0x4, 0xfe000000, 0x3f, 0x800, 0x0, 0x6, 0xfffffffe, 0x8, 0x80000001, 0xfffffffe, 0x1000, 0x4, 0x7fff, 0x200, 0xdb, 0xffff0000, 0x8000, 0x1ff, 0x2, 0x8, 0x9, 0x400, 0x9, 0x6, 0xffffff00, 0x3, 0x2, 0x101, 0x400, 0x1000, 0x3, 0xa2d1d9ae, 0x0, 0xffff0000, 0x8e, 0x7, 0x7, 0x0, 0x80000001, 0x0, 0xd, 0x194e, 0x0, 0x7, 0x7f, 0x0, 0x8001, 0x1, 0x5, 0x0, 0x5, 0x200, 0x2, 0x2, 0x6, 0x7bd0, 0x7, 0xfffffff8, 0x80000000, 0x80000000, 0x1, 0x3ff, 0x400000, 0xffff, 0xfa, 0x8000, 0x7f, 0x6, 0x0, 0x2, 0x6, 0x40000, 0x9, 0x4, 0x9, 0x114dbe77, 0xffff, 0xfffffffa, 0x7d6f, 0x9c, 0x5a, 0x93e, 0x8000, 0x7fff, 0x9de4, 0x100, 0x5, 0x5, 0x80000000, 0x6, 0x3, 0x2, 0x7, 0x9740000, 0xc1a, 0x1, 0x858cb92, 0x80000000, 0xe8ee, 0xffffffff, 0xfffffffc, 0x0, 0x7, 0x1f, 0x2, 0x2, 0x3f31, 0x6, 0x9, 0x2, 0x6, 0x9, 0x80000000, 0x6, 0x6, 0x87, 0x6f6, 0x10000, 0xff, 0x1, 0x1, 0x3, 0x400, 0xfffffffa, 0x9d3, 0x7, 0x0, 0x100, 0x5768, 0x1, 0x1, 0x7, 0x5723, 0x4, 0x88, 0x7fff]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7fff}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7a, 0x1, 0x5, 0x14000, 0x4e8e, 0x1f, 0x2, 0x4, 0x100000, 0x3b8, 0x6, 0x9, 0x1, 0x3, 0x9, 0xf9, 0x7f, 0x1, 0x7, 0x764, 0x4, 0x4dc091a7, 0x6, 0xff, 0xfffffff8, 0x56, 0x8, 0x80, 0x3f, 0x9, 0x6, 0x80000001, 0x5, 0x5, 0xffffaa53, 0x8, 0xffffffff, 0x10001, 0x10000, 0x3, 0x0, 0x8, 0x3f, 0x9, 0x6, 0x3f, 0x8, 0x3, 0x0, 0x1, 0x470, 0x6, 0x8, 0x4, 0x40, 0x31a, 0x6, 0x2, 0x2, 0x1, 0x101, 0x80000001, 0x3, 0x4, 0x66c, 0x1, 0x7fffffff, 0xfff, 0x1, 0x200, 0xc1, 0x3ff, 0x101, 0xdd4, 0x80000000, 0x7, 0xf670, 0x828, 0x80, 0x81e, 0x4, 0x4, 0x9fb, 0x80000001, 0x2, 0xfffffffa, 0x5, 0xf91, 0xbc1, 0x6, 0x6, 0x9, 0x400, 0x9, 0x7, 0x5, 0x9, 0x7fffffff, 0x3, 0x6, 0x9, 0x42, 0x1, 0x5, 0x6, 0xa4ed, 0x8, 0x6, 0x54, 0x1, 0x1, 0x80000001, 0x6, 0x8, 0x6, 0x4, 0x8, 0x1, 0x2, 0x1, 0x5, 0x2, 0x7f, 0xffffffb5, 0x2, 0x5, 0x1f, 0xfffffffe, 0x10000, 0x3, 0x57, 0x3, 0x400, 0x6, 0x10000, 0x3, 0x80, 0x80, 0xffffffff, 0x7, 0x1, 0x8, 0x2, 0x42, 0x1ff000, 0x9, 0x1ff, 0x62, 0x3, 0x6, 0x7ff, 0x7ff, 0x2, 0x7fffffff, 0x0, 0x10001, 0x30e4dacb, 0x65, 0x1, 0x7b, 0x3, 0x7fffffff, 0x68f74fb1, 0x80000000, 0x4c, 0x3, 0x8, 0x8, 0x3, 0x9, 0x3, 0x9, 0x1000, 0x9, 0xe5b00000, 0xfffff001, 0x1f, 0x8, 0x0, 0x5, 0x8, 0x1, 0x7, 0x3d21, 0x1f, 0x3, 0x76aa, 0xfffffff8, 0x0, 0x5, 0x4, 0x9, 0x80000001, 0x1a, 0xffffffff, 0xcad, 0x800, 0x3, 0x81, 0xc9, 0x10000, 0x737, 0x6000000, 0x1, 0x75, 0x0, 0x2, 0x2, 0x81, 0x4, 0x3, 0x6, 0x80000001, 0x80000000, 0xba6, 0x6, 0x8, 0x8, 0x7, 0x6, 0x2, 0x1, 0x81, 0x9, 0x7fff, 0x2000, 0x1f, 0x6, 0x1, 0x5, 0x0, 0x7, 0x19, 0x52b, 0x6, 0xfffffffa, 0x6, 0x5, 0x7f, 0x1, 0x6, 0x0, 0x0, 0x2, 0x86, 0x9, 0x10000, 0x98, 0xdc, 0x2, 0x7fff, 0x80000000, 0x5, 0x0, 0xfffffff9, 0x3]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x10000, 0x20000000, 0x6, 0x3, 0x0, {0x0, 0x0, 0x1, 0x6, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x100, 0x1, 0x4}, 0xffffffc0, 0x2}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_RATE64={0xc, 0x8, 0x489}]}]}}]}, 0x8b8}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$rose(r4, 0x104, 0x2, &(0x7f0000000080)=0x776, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="480000002800270d000000005efe9d89e0c806e2", @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) recvfrom$phonet(r0, &(0x7f00000000c0)=""/111, 0x6f, 0x10160, &(0x7f0000000140)={0x23, 0xce, 0x81, 0x1f}, 0x10) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:56 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_AGP_RELEASE(r6, 0x6431) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0xfc, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7, {}, {0x0, 0x13}}, [@TCA_RATE={0x6, 0x5, {0x1f, 0x5}}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0xb0, 0x2, [@TCA_FW_MASK={0x8, 0x5, 0x9}, @TCA_FW_CLASSID={0x8, 0x1, {0xb, 0x8}}, @TCA_FW_INDEV={0x14, 0x3, 'gretap0\x00'}, @TCA_FW_INDEV={0x14, 0x3, 'bridge_slave_0\x00'}, @TCA_FW_MASK={0x8, 0x5, 0x5}, @TCA_FW_MASK={0x8, 0x5, 0x4}, @TCA_FW_CLASSID={0x8, 0x1, {0xffe0, 0xf}}, @TCA_FW_INDEV={0x14, 0x3, 'team_slave_0\x00'}, @TCA_FW_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x2, 0x80, 0x81, 0x5dbbdfb2, {0x81, 0x0, 0x5, 0x9, 0x120, 0xfffffffb}, {0x64, 0x0, 0x4, 0x7, 0x81, 0x7}, 0x100, 0x8, 0x6}}]}, @TCA_FW_MASK={0x8, 0x5, 0x10000}]}}, @TCA_CHAIN={0x8, 0xb, 0x7a22}, @TCA_RATE={0x6, 0x5, {0x9, 0x81}}, @TCA_CHAIN={0x8, 0xb, 0x10001}]}, 0xfc}}, 0x0) 22:37:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000002c0)={r5, 0x4}, &(0x7f0000000300)=0x8) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000287412000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200040, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r7, 0x3312, 0x100000000) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@gettclass={0x24, 0x2a, 0x2, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xffe0, 0x4}, {0x5, 0x3}, {0xfff2, 0xb}}, ["", "", "", "", "", ""]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) recvfrom$phonet(r0, &(0x7f00000000c0)=""/111, 0x6f, 0x10160, &(0x7f0000000140)={0x23, 0xce, 0x81, 0x1f}, 0x10) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 657.760224] XFS (loop4): Invalid superblock magic number [ 657.876288] qfq: invalid weight 458756 22:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = socket$kcm(0x10, 0x2, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000fc0)={0x44, r9, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r7, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r9, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 657.959930] XFS (loop0): Invalid superblock magic number 22:37:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xfff3}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002800270d00000dd60000000009000000", @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) 22:37:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 658.103776] IPVS: Unknown mcast interface: rose0 [ 658.109385] qfq: invalid weight 458756 22:37:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r6, 0xc0845657, &(0x7f0000000380)={0x0, @bt={0x9, 0x10000, 0x1, 0x1, 0x10001, 0x9, 0x5, 0xfff, 0x8001, 0xffffffff, 0x101, 0x3, 0x0, 0x5, 0x0, 0x6, {0x4, 0x9}, 0x0, 0x7}}) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r9}}, 0x24}}, 0x0) 22:37:57 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 658.235358] XFS (loop4): Invalid superblock magic number 22:37:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 658.284718] qfq: invalid weight 458756 22:37:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000000c0)={0x80000000, 0x0, 0x1, 0x200, 0x3, 0x2, 0x8}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000081eb050700421ce7b7fbcb2b7600000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$SIOCRSGCAUSE(r7, 0x89e0, &(0x7f0000000140)) [ 658.322408] IPVS: Unknown mcast interface: rose0 22:37:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 658.433164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60289 sclass=netlink_route_socket pid=3295 comm=syz-executor.1 22:37:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_AGP_RELEASE(r6, 0x6431) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0xfc, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7, {}, {0x0, 0x13}}, [@TCA_RATE={0x6, 0x5, {0x1f, 0x5}}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0xb0, 0x2, [@TCA_FW_MASK={0x8, 0x5, 0x9}, @TCA_FW_CLASSID={0x8, 0x1, {0xb, 0x8}}, @TCA_FW_INDEV={0x14, 0x3, 'gretap0\x00'}, @TCA_FW_INDEV={0x14, 0x3, 'bridge_slave_0\x00'}, @TCA_FW_MASK={0x8, 0x5, 0x5}, @TCA_FW_MASK={0x8, 0x5, 0x4}, @TCA_FW_CLASSID={0x8, 0x1, {0xffe0, 0xf}}, @TCA_FW_INDEV={0x14, 0x3, 'team_slave_0\x00'}, @TCA_FW_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x2, 0x80, 0x81, 0x5dbbdfb2, {0x81, 0x0, 0x5, 0x9, 0x120, 0xfffffffb}, {0x64, 0x0, 0x4, 0x7, 0x81, 0x7}, 0x100, 0x8, 0x6}}]}, @TCA_FW_MASK={0x8, 0x5, 0x10000}]}}, @TCA_CHAIN={0x8, 0xb, 0x7a22}, @TCA_RATE={0x6, 0x5, {0x9, 0x81}}, @TCA_CHAIN={0x8, 0xb, 0x10001}]}, 0xfc}}, 0x0) 22:37:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r6, @ANYBLOB="000600"/12], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16], 0x28}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x7c, 0x0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'ip6gretap0\x00'}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x3}}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'bond_slave_1\x00'}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'vlan0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000800) 22:37:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 658.573646] qfq: invalid weight 458756 [ 658.587209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60289 sclass=netlink_route_socket pid=3295 comm=syz-executor.1 22:37:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f00000002c0), 0x347) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYRESOCT=r6, @ANYRES32=r5, @ANYRES16=r8], 0x48}, 0x1, 0x0, 0x0, 0x8114}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x4, 0x0, {0x0, 0x0, 0x4000, r5, {}, {0x10}, {0x0, 0xb}}}, 0x24}}, 0x0) 22:37:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r7 = dup3(r6, r5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000080)={r8, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000080)={r8, 0x4}, &(0x7f00000000c0)=0x8) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:37:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0xffffff67, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0x4}}, [@TCA_CHAIN={0x8, 0xb, 0x1}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:57 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x8, 0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)={{0x108, 0x80, 0x40, 0x3af, 0x39a, 0x100, 0x32d, 0x7ff}, "b6d410a1f91a2454c2d2d0c8e57b4ea015c6d3acc9bcddbee506714a527f510a16dc6d5822c44d6c352f6803cda64e945290ac90", [[], [], [], [], [], [], [], []]}, 0x854) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r3, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480)={r3, 0x6a, 0x5, [0xfff8, 0x2, 0x4, 0xaa7, 0x4]}, &(0x7f00000004c0)=0x12) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000500)={r4, 0x2, 0x6}, 0x8) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r9, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_ENUMSTD(r9, 0xc0485619, &(0x7f00000002c0)={0xffffffff, 0x1700, "b5d1f06c8881b6d08097c578b7bf2798e2304302fbd45d6b", {0x382, 0x4}, 0x5}) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4804000000000507000000001000000000000040", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r8, @ANYBLOB="f9ffffffffffffff685e52c41f000100727376705b5b66e09c6884859a9b80299afe75f56571d40475b68d8d6542e439ccab434f5eb33de691e6dd629262901235072688d872e27e39e5dd0d980e5bd90ad849946dedaa388f2db157e55ba2377c451eaeb0fa1c75ac7cc68b281aaa5d3f6f6301c88e179a3aa82fdeaf89b56f5e78f3bdd3a2ad171721d13b7458efcbc359d894206429f18307d6084d518792c556f5f289b55cd33f38852ad9054227e021d86e00"/200], 0x34}}, 0x0) 22:37:58 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x8, 0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)={{0x108, 0x80, 0x40, 0x3af, 0x39a, 0x100, 0x32d, 0x7ff}, "b6d410a1f91a2454c2d2d0c8e57b4ea015c6d3acc9bcddbee506714a527f510a16dc6d5822c44d6c352f6803cda64e945290ac90", [[], [], [], [], [], [], [], []]}, 0x854) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x81}, 'port0\x00', 0x8, 0x0, 0x3b, 0x0, 0x1, 0x7, 0x7, 0x0, 0x7, 0x1}) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x30, r9, 0x1, 0x0, 0x0, {{}, {}, {0xf}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r7, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r9, 0x8, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:58 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:37:58 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x13, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x5}, 0x4) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000140)={0x8000, 0x80000000}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r5, 0x114, 0xa, &(0x7f0000000080)={0x1, "d7"}, 0x2) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 659.127525] XFS (loop0): Invalid superblock magic number 22:37:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x4bc, 0x0, 0x5, 0x401, 0x0, 0x0, {0x7, 0x0, 0x8}, [{{0x254, 0x1, {{0x0, 0x101}, 0x5, 0x48, 0x800, 0x9df2, 0x27, 'syz1\x00', "78011c30a436b164d4ba9b38d243df833345dff9c35e6e6132630c4c81b96cc0", "5051826657dd96d7f80b44b7c1548186975908b7bca323d4fba4502cca8b9c3b", [{0x2, 0x6, {0x3, 0x480000}}, {0x0, 0x6, {0x3, 0x1}}, {0x1, 0x3f, {0x2, 0x1}}, {0x5, 0x44, {0x0, 0x4c}}, {0x2, 0x6, {0x0, 0x1a2ca598}}, {0x7c8, 0x9, {0x0, 0xc0}}, {0x8, 0x2, {0x3, 0x9}}, {0x7, 0x7f, {0x2, 0x4}}, {0xfce, 0x1, {0x2, 0x2}}, {0x1000, 0xc27, {0x0, 0x4}}, {0x800, 0x2, {0x1, 0xf39}}, {0x1, 0x7, {0x3, 0x10001}}, {0x4, 0x3, {0x1, 0x4}}, {0x1200, 0x3ff, {0x3, 0x3}}, {0x20, 0xff, {0x1, 0x200}}, {0x4b9, 0xde1, {0x0, 0x1}}, {0x8, 0x81, {0x3, 0xdcd}}, {0x1, 0x8, {0x1, 0x1}}, {0x6, 0x8, {0x1, 0x3}}, {0x5305, 0x2, {0x2, 0xfffffeff}}, {0x100, 0x7, {0x2, 0xd61}}, {0x400, 0x5, {0x2, 0x80}}, {0x5, 0x1ff, {0x3, 0x3}}, {0x0, 0x400, {0x3, 0x4}}, {0xffff, 0x3, {0x1, 0x5}}, {0x23, 0x8, {0x2, 0x8}}, {0x9, 0x3d, {0x2, 0xd8}}, {0x1, 0x3, {0x2, 0x80}}, {0x4, 0x3, {0x1, 0x81}}, {0xfff8, 0x401, {0x0, 0x1ff}}, {0x6, 0x6, {0x1, 0x1}}, {0x1, 0x2, {0x3, 0x80000000}}, {0x4, 0x6, {0x1, 0x7fff}}, {0x40, 0x1, {0x2, 0x7}}, {0x5, 0x1, {0x1, 0x400}}, {0x9, 0x3, {0x1, 0x5}}, {0xee, 0x0, {0x3}}, {0x0, 0x7, {0x2, 0x6}}, {0x2, 0x100, {0x2, 0x25e89b77}}, {0xc6, 0xd, {0x3, 0x7}}]}}}, {{0x254, 0x1, {{0x0, 0xffffffe0}, 0xff, 0x4, 0x7, 0x16d0, 0x1f, 'syz0\x00', "21d46f7f4458553c0c241143ad57b6bdab0721436df395bc72879ac209e2b6ef", "aa261508868bf2b5bdcb9a2951dcd2b170a82cf483a974ce66f4c7dbe7c09727", [{0x4, 0x7, {0x2, 0x10000}}, {0x64f, 0x2, {0x1, 0x2}}, {0x4, 0x4, {0x3}}, {0x7ae5, 0x1000, {0x0, 0x20}}, {0x0, 0x2, {0x0, 0x7}}, {0xce5, 0xfff9, {0x1, 0xffffffff}}, {0x2, 0xffc0, {0x1, 0x55}}, {0xffc1, 0x37, {0x1, 0x7}}, {0x7, 0x4, {0x2, 0x7}}, {0xa087, 0x4, {0x1, 0x81}}, {0x40, 0x1000, {0x2, 0x6}}, {0x400, 0x2, {0x0, 0x3}}, {0x6, 0x54aa, {0x1, 0xe77}}, {0x9, 0xffff, {0x1, 0x4}}, {0x3, 0xfffc}, {0x7, 0x2, {0x0, 0xf9e0}}, {0x9, 0x0, {0x2, 0x4}}, {0x4, 0x8, {0x1, 0x2}}, {0x6, 0x1, {0x1, 0xffffff01}}, {0x3b09, 0xb, {0x1, 0x127}}, {0xffff, 0x4, {0x1, 0xfffffffd}}, {0x5, 0x5, {0x0, 0x8}}, {0x5, 0x401, {0x2, 0xfb5a}}, {0x1166, 0x9, {0x1, 0x991b}}, {0x3, 0x81, {0x3, 0x7}}, {0x19, 0x5, {0x2, 0x2}}, {0xfff9, 0x7, {0x1, 0xffff}}, {0xff01, 0x3, {0x2, 0x4}}, {0x2, 0x40, {0x1, 0x80000001}}, {0x5, 0x401, {0x3, 0x7}}, {0x101, 0x3f, {0x2, 0x1}}, {0x58b6, 0x40, {0x2, 0x3b}}, {0x200, 0x0, {0x2, 0x401}}, {0x1, 0x8000, {0x0, 0x4}}, {0x0, 0x6f, {0x0, 0xb21}}, {0x4, 0x1, {0x2, 0x400}}, {0x5, 0x7f, {0x1}}, {0x4, 0x6, {0xe28914d52ec64d5c, 0x3}}, {0xc2, 0xffff, {0x0, 0x2}}, {0x3, 0xf47, {0x3, 0x7fff}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:58 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:37:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="1848000000100005070000000010000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xa}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$IPSET_CMD_TEST(r6, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0xb, 0x6, 0x505, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}}]}]}, 0x58}}, 0x20000000) 22:37:58 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:37:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r8}}, 0x24}}, 0x0) [ 659.523989] XFS (loop4): Invalid superblock magic number 22:37:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000140), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/38) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030000ac415fae442715cce890107005a379fbd8330fcb3899465d4ae00a807930000000087d7f7"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x14022, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:58 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:37:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00020000ff81ae2cd4006671"], 0x74}}, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r5, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f0000000380)={0x3, @sliced={0x80, [0x100, 0x0, 0x200, 0x4, 0x81, 0x6, 0xc2, 0x3, 0x0, 0x6d2, 0x48d2, 0xa3, 0x4, 0x9, 0x3, 0x2, 0x1, 0x120, 0x53, 0x3c32, 0x100, 0x8, 0x5, 0x7f, 0x3, 0x0, 0x7, 0x0, 0x9, 0x9, 0x20, 0x3, 0x7ff, 0x2, 0xb626, 0x4, 0xb27f, 0x7, 0x4, 0x0, 0x8, 0x7, 0xff, 0x40, 0x6, 0x6, 0x1d, 0x4], 0x1}}) flistxattr(r3, &(0x7f0000000080)=""/48, 0x30) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000140), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/38) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030000ac415fae442715cce890107005a379fbd8330fcb3899465d4ae00a807930000000087d7f7"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x14022, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="7405000000000000000000060000000000000000bd60ecf1490ad32389a7f691e4b8264f002a66e9895c917bc7e571514147255a4ef7b5e20782854d7ff7e4d4", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) epoll_create(0x6) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000019c0)=@newtfilter={0x1ed8, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x1ea8, 0x2, [@TCA_RSVP_ACT={0x1ea4, 0x6, [@m_pedit={0x1ea0, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1df8, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0xac, 0x5, 0x0, 0x1, [{0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x7, 0x8, 0xffffffffffffffff, 0x6, 0x2}, 0x8, 0x0, [{0x1, 0x9, 0x9, 0x6, 0x2, 0xfffffff7}, {0x4, 0x400, 0x101, 0xcc, 0xc1, 0x1044}, {0x7, 0x3, 0xfff, 0x8, 0x1ea7, 0x2f}]}, [{0x4, 0x7fffffff, 0x9, 0x5, 0x1ff, 0x1000}, {0x8, 0x0, 0x8000, 0x7fffffff, 0xff, 0x200}, {0x9, 0x6b, 0x80, 0x9, 0xa8, 0x8}, {0x6, 0x3, 0x14c4, 0x0, 0x80000001, 0x7fff}, {0xffffffff, 0x80000000, 0x3ff, 0x6, 0x2, 0x8001}, {0x1ff, 0x0, 0x7fff, 0x5, 0x2, 0x1000}, {0x4, 0x0, 0x4, 0x1, 0x54, 0x9}, {0x7fff, 0x0, 0x4, 0x7f, 0x4a0, 0x80000000}, {0x839, 0x8, 0x4, 0x8, 0xfffffc0f, 0x9e}, {0x3, 0x0, 0x0, 0x5c, 0x1, 0x33}, {0x1f, 0xffffffff, 0x9, 0x2, 0x7, 0x34a}, {0x764, 0x7, 0x20, 0x2, 0xffffffff, 0xfffffff7}, {0xffff, 0x80, 0x76b3, 0x4, 0xcb, 0x6}, {0x2, 0x80000001, 0x24, 0x100, 0x7, 0x7fffffff}, {0x9, 0xfffffff7, 0x8, 0xe0000, 0x80, 0x5}, {0x61d, 0x9, 0x0, 0x5, 0x6, 0x7f}, {0x8, 0x37cc2419, 0x5, 0x0, 0x5, 0xed4a}, {0x4, 0x79d0, 0x1, 0x401, 0x7, 0x1}, {0xffffffff, 0x6, 0x6, 0x8, 0x0, 0xffffffff}, {0x0, 0x9, 0x800, 0x2, 0x7, 0x800}, {0x9, 0xdff7, 0x92, 0x5, 0x9, 0x1f}, {0x0, 0x7, 0x3, 0x1, 0x5, 0x3}, {0x6, 0x3, 0x8, 0x0, 0x74, 0x2}, {0x8, 0x8, 0x5, 0x21f0, 0x6, 0xffffffff}, {0x6, 0x4, 0x6, 0x9ba, 0x40, 0x100}, {0xddb1, 0x4, 0xff, 0x1, 0xd906, 0xfffffffe}, {0x9, 0x1ff, 0x3, 0x7, 0x4951, 0x7}, {0x9, 0x1, 0x5, 0x4, 0xbbcc, 0x4}, {0xffffffff, 0x1, 0x0, 0x6, 0x40, 0x9}, {0x10fa, 0x5, 0x4, 0x101, 0x2, 0x8}, {0xc4fc286, 0x7346, 0x1, 0x3, 0x0, 0x7ff}, {0x4, 0x0, 0x5, 0x18a298e0, 0x5a78, 0x8}, {0x8, 0x3, 0x3, 0x200, 0x8000, 0x1}, {0x9, 0x7ff, 0x3, 0x9, 0x6, 0x80000001}, {0x5, 0x80000001, 0x8, 0xee, 0x5, 0xfff}, {0x4, 0x0, 0xe43a, 0x4, 0x0, 0xe2}, {0xffff3247, 0xffff7edf, 0x7fffffff, 0x9, 0xfff, 0x6}, {0x0, 0x7ff, 0x5, 0x81, 0x41ea, 0x1}, {0x2, 0xffff, 0x33, 0x1ff, 0x7, 0x200000}, {0x2, 0x9, 0x4, 0x2, 0x200, 0x7}, {0x1ff, 0xa000, 0x8001, 0x7, 0x40, 0x2}, {0x7, 0x9, 0x5, 0x3ff, 0x926f, 0x1}, {0x100, 0x6, 0x9, 0x8001, 0x3, 0xfffffff9}, {0x6, 0x1, 0x2, 0xffff, 0x5, 0x80000000}, {0x1f33, 0x400, 0xbd00, 0x0, 0x101, 0x6}, {0x2, 0xfffffe9f, 0x81, 0x6, 0x2, 0x4}, {0x80, 0x7, 0x0, 0xdb, 0x9, 0x2}, {0x5, 0x2c6c, 0xffffffe1, 0x9, 0x4a, 0xffff5880}, {0x3, 0x3f, 0x5, 0x1, 0x141, 0x20}, {0x20, 0xfffffff8, 0x0, 0x3, 0x10000, 0xd795}, {0x5, 0xa59b, 0x0, 0x9, 0x3, 0x1}, {0x5, 0x100, 0x7, 0x0, 0x5, 0x2}, {0x8, 0xfffffffb, 0x101, 0x40, 0xe74, 0x40}, {0x100, 0x80000001, 0x5, 0x7fffffff, 0xffff, 0x1000}, {0x2ff, 0x1000, 0x35d, 0xc016, 0xff, 0x7fffffff}, {0x6, 0x0, 0x1f, 0x7, 0x0, 0x6}, {0x6e19, 0x795a, 0x0, 0x1eaa, 0x8, 0x7f9}, {0x3ff, 0xfff, 0x8, 0x8, 0x3, 0x6}, {0x0, 0x4, 0x0, 0x9, 0x1ff, 0x7fffffff}, {0x6, 0x2, 0x8, 0x6, 0x4, 0x5}, {0x7a77, 0x1, 0xbc7, 0x7, 0x5, 0x10001}, {0x1000, 0x9, 0xffff, 0x9, 0x8, 0x400}, {0x5, 0x1f, 0x200, 0x4, 0x80, 0x80}, {0x98, 0x2, 0x1, 0x0, 0xc5b0, 0x7}, {0x6, 0x2, 0x6356bfdb, 0x80, 0xc4a, 0x5}, {0xe8, 0xe7, 0x3, 0xa0, 0xfffffffe, 0xfffffffa}, {0x3, 0x3f, 0xfffff112, 0x9, 0x7de, 0x4}, {0x0, 0x4, 0x8, 0x9, 0x2, 0xb7b7}, {0x7, 0x101, 0x6, 0x6, 0xc7, 0x1f}, {0x5, 0x5, 0x9, 0x4, 0xffffff80, 0x4}, {0x2, 0x6, 0x9, 0x0, 0xcf6}, {0x0, 0x400, 0x6, 0x272d261e, 0x80000000, 0x5}, {0x8, 0x6, 0x4, 0x6, 0x1, 0x5b19}, {0x0, 0x1, 0x8001, 0x8, 0x0, 0xffff}, {0x1, 0x0, 0x1ff, 0x73, 0x10001}, {0x3, 0x0, 0x0, 0x9, 0x3, 0x3}, {0x2a4, 0x8, 0x7, 0x3, 0x1}, {0xfc, 0x2, 0x1, 0x0, 0x20, 0xef0}, {0x7fff, 0x5, 0x101, 0xd5, 0x3}, {0x8000, 0x2, 0x1, 0x4a2, 0xfff, 0x5}, {0x7, 0x20, 0x2, 0x0, 0x0, 0x7ff}, {0x143800, 0x8b1, 0x3, 0xffffffff, 0xffff, 0x6}, {0x69f501b, 0x101, 0xd56, 0x2, 0x3f, 0x6}, {0x3ba, 0x0, 0xff, 0x1000, 0x5, 0x8}, {0x101, 0x1, 0x15a, 0x8, 0x0, 0x7f}, {0x1ff, 0x1f, 0x8, 0x4, 0xffff, 0xc4000000}, {0x7ff, 0x6, 0x0, 0x60, 0x40e2, 0x4}, {0x1, 0x5, 0x6a71, 0xa, 0x5b82, 0x4}, {0x8, 0x2, 0x20, 0x101, 0xffffffff, 0x3}, {0x1, 0xffffff7f, 0x100, 0x3, 0x10001, 0x8}, {0x5, 0x1000, 0xdc, 0x7, 0x9, 0x8}, {0x8, 0xffff, 0x0, 0x6, 0x3, 0x6}, {0x40, 0x8, 0x19, 0x7f, 0xff, 0x7e1}, {0x401, 0x379dbbeb, 0x2, 0x0, 0x1, 0x8}, {0x8000, 0x2, 0x6, 0x5, 0x9, 0x8}, {0xff, 0x7, 0xffff7fff, 0x6, 0x2, 0x40}, {0x400, 0x216d, 0x3, 0x7, 0xfff, 0xfffff49a}, {0x1, 0xfffffff9, 0x7, 0x4, 0x2, 0x7}, {0x100, 0x2, 0x100, 0x1000, 0x2, 0x3}, {0x4, 0x0, 0x2, 0x1, 0xcc92, 0x4}, {0x1000, 0xffffffe1, 0x207a, 0x3, 0x8000, 0xa8}, {0x7082e9ea, 0x1, 0x2, 0x7fff, 0x40, 0xfffffff9}, {0xd288, 0x9, 0x4, 0xfffffffa, 0x101, 0x81}, {0x7a, 0x80000000, 0x1, 0x6, 0x9, 0x7}, {0x471b, 0x10001, 0x0, 0x4, 0x9, 0x1}, {0x8, 0x0, 0x557, 0xffff8000, 0x101, 0x9}, {0xfffffffd, 0x0, 0xfffffff7, 0x0, 0x7, 0x80000001}, {0x2, 0x6, 0x2, 0x10001, 0x56}, {0x2, 0x5, 0xf2b, 0x4, 0x5, 0x5}, {0x1, 0x5, 0x1ff, 0x252a, 0x2, 0x80000000}, {0x6, 0x1, 0x3, 0x7fffffff, 0x0, 0x3d5}, {0x4, 0xfffffff8, 0x5, 0x10001, 0x3, 0xff}, {0x6, 0x7, 0x80000000, 0x9, 0x20, 0x5}, {0x8000, 0x8000, 0x2, 0x2, 0x8, 0x1}, {0x2, 0x8, 0x6, 0xe6, 0x1, 0x40}, {0x6, 0x800, 0x3, 0x832, 0x71f, 0x800}, {0xa14f, 0x8001, 0x81, 0xfffffffd, 0x1, 0xfffffff9}, {0x49245600, 0x8, 0x7, 0x7f, 0x489, 0x8}, {0xffffffff, 0x4, 0xffffffff, 0xd7, 0xd3, 0xffffffff}, {0x6, 0x80000001, 0x5, 0x0, 0x2, 0x40}, {0x2, 0x400, 0x9, 0xc6d, 0x54da, 0x3}, {0x3, 0x81, 0x5, 0x4ffc, 0x100, 0x1a94f191}, {0x200, 0x8, 0xff, 0x3, 0x3, 0x5}, {0x65670597, 0x7, 0x7fffffff, 0x8, 0xb3ae, 0x2}, {0x3, 0x6, 0x3, 0x100, 0xff4, 0x8}, {0x0, 0xfffffffc, 0x3, 0x5, 0x8, 0x3}, {0x0, 0x9, 0x10001, 0xe9cc, 0x4, 0x99a3}, {0xffffff81, 0x8, 0x8, 0x7f, 0x7, 0x9}], [{0x1, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {}, {0x3}, {0x3, 0x1}, {0x3}, {0x3, 0x1}, {0x3}, {0x3}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x5}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {}, {0x2}, {}, {0x5, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x1}, {}, {0x3, 0x1}, {0x1}, {0xb0502d678441e50b}, {0x4, 0x1}, {0x2}, {0x5}, {0xa, 0x1}, {}, {0x2, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {0x2, 0x1}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {}, {0x2, 0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x1}, {0x1, 0x1}, {0x5}, {0x3, 0x1}, {0x3}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x2, 0x1}, {0x6}, {0x1, 0x1}, {0x2}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {0x5}, {0x1}, {0x1}, {0x2}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x2}, {0x4}, {0x3}, {0x5, 0x1}, {0x1}, {0x4}, {}, {}, {0x4}, {0x3, 0x5f14e8cea8842371}, {0x4, 0x1}, {0x5}, {0x5}, {0x2}, {0x1, 0x3}, {0x3, 0x1}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x5}, {0x5}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x28760392175c056b}, {0x2}, {}, {0x9}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x2}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {0x2, 0x2}, {0x1, 0x1}, {0x5}]}}, @TCA_PEDIT_PARMS={0xee0, 0x2, {{{0x1, 0x94, 0x0, 0x0, 0xfffff11c}, 0x1f, 0x6, [{0x850, 0x7, 0x5, 0xc6, 0x80, 0x56}, {0x2, 0x1c, 0x964e, 0x200, 0x207, 0x7}, {0xa4, 0x4, 0x9, 0x1ff, 0x8, 0x9}, {0x0, 0x0, 0x1, 0xfffffffe, 0x8, 0x3f}, {0xfd, 0x3f, 0x3, 0x1, 0x0, 0x80000000}, {0x4, 0x2, 0x4, 0x1, 0x4, 0x9}, {0x8, 0x4, 0x3, 0x9c6, 0x1, 0x100}, {0x3ff, 0x2, 0x35bd, 0x5, 0x9, 0x4}]}, [{0x2, 0xfff, 0x2, 0x80000000, 0x4, 0x80000000}, {0xb2, 0x7, 0x10001, 0x8, 0x8001, 0x431}, {0xffffffff, 0x9, 0xf9, 0x0, 0x392, 0x4}, {0x3ff, 0x7f, 0x9, 0x9, 0x5}, {0x1f, 0x1, 0x9d6, 0x6, 0x3, 0x81}, {0x3ff, 0x9, 0x342, 0x7fffffff, 0xe0000000, 0xc}, {0xffffffff, 0x1, 0x0, 0x8001, 0xffffff86, 0xe60}, {0x4, 0x7, 0x7ff, 0x6e8, 0x0, 0x10001}, {0x5, 0x100, 0x3, 0x7, 0x5, 0x2}, {0x8, 0x2, 0x8, 0x6, 0x10000, 0x6}, {0x7f, 0x7f, 0x6, 0x6, 0x0, 0x1}, {0x0, 0x3ff, 0x6809, 0x4, 0x5452, 0x6}, {0x5928, 0x7, 0x5, 0x1, 0xffffffff, 0x1ff}, {0x1, 0x400, 0x0, 0x7, 0xffffffff}, {0x1, 0x5, 0x100, 0xfffffffd}, {0xfffffe00, 0x6, 0x99, 0x80000000, 0x8a, 0x2}, {0x6, 0xffffffff, 0x3, 0xffff, 0x7ff, 0x7}, {0x4, 0x0, 0x7, 0x7, 0x10000, 0x5}, {0x2378, 0x800, 0x1000, 0x5a7f1bdc, 0x2, 0x3}, {0x6, 0x6, 0x2, 0x80, 0x3, 0xb9}, {0x5, 0x2000, 0x3c000000, 0x390, 0x9, 0x2}, {0x3, 0x4, 0x1ff, 0x2, 0x400, 0x3}, {0x9, 0x4, 0x8, 0x0, 0x7, 0x3}, {0x0, 0x0, 0xffff, 0x0, 0x0, 0x80000001}, {0x8, 0xffffffff, 0xa1, 0x4, 0xa8c9, 0x4}, {0x0, 0x3, 0x8001, 0x4, 0x4, 0x8}, {0x4, 0x4, 0x1, 0x775ae5c1, 0x80000001, 0xff}, {0x70bc, 0x200, 0x3ff, 0x5fc, 0x8, 0x9}, {0x6, 0x2, 0x3, 0x4, 0x5, 0x2}, {0x4, 0x1a, 0x1, 0x21d, 0x1, 0x4}, {0x1, 0x8b, 0x80000001, 0x5, 0x8, 0x5}, {0xc34, 0x5, 0x7f, 0x80, 0x1ff, 0x4}, {0x1000, 0x4, 0x800, 0x10000, 0xf0, 0x6}, {0xffffffff, 0x3, 0x0, 0x4d82, 0x963}, {0x1, 0x1f, 0x80000000, 0x9, 0x401, 0x4}, {0x0, 0x6, 0x8001, 0x1000, 0x90, 0xc1a}, {0x6b3e, 0x2, 0x75b4e01f, 0x78d, 0x6, 0x7ff}, {0x3, 0x65810, 0x9, 0xfff, 0xfff, 0x9}, {0x6, 0xfffffffc, 0xfffffff8, 0x9, 0x5, 0x5}, {0x7, 0x1c8b, 0xfffffffb, 0x7, 0x5, 0xffff8000}, {0x8, 0xfffffffc, 0x7fffffff, 0x81, 0x55, 0x4}, {0xfffff000, 0x9, 0xffffffff, 0x6, 0x2, 0x2}, {0x24, 0x8dd, 0xffffff81, 0x20000000, 0x8d, 0x6}, {0x80, 0x7ff, 0x5, 0x9, 0x3, 0xfffffff7}, {0x1f, 0x1, 0xde3, 0x7f, 0x80, 0x2}, {0xffffffff, 0x7fffffff, 0x6, 0x3, 0x0, 0xffffffe1}, {0x9, 0x7, 0x4, 0x1ff, 0x401, 0x7fff}, {0x0, 0x1f, 0x7f, 0x4, 0xc400, 0xfff}, {0x100, 0x1, 0x7f, 0x5, 0x7fffffff, 0x7}, {0x3, 0x80000000, 0x9, 0x8001, 0x20, 0xfffffff9}, {0x0, 0x5, 0x80000001, 0x2, 0x1, 0xa2c}, {0x1ff, 0x2, 0x65, 0x4, 0x2, 0x1f}, {0x9, 0x8, 0x8001, 0x8, 0x0, 0xffff8000}, {0x0, 0x4bf, 0x1000, 0x1ff, 0x8, 0xfff}, {0x3f, 0x5, 0x81, 0x5, 0x7fffffff, 0xc0b}, {0x4, 0x0, 0x8000, 0x8, 0x286, 0x1f}, {0x3ff, 0xff, 0x0, 0x577, 0x7, 0x7fff}, {0x0, 0x7f, 0x3, 0x3, 0x0, 0x4}, {0x1, 0x0, 0x3, 0xb0, 0x1, 0x5}, {0x2, 0xb2a, 0x6269, 0x8000, 0x7, 0x1}, {0x1a, 0x3, 0x5, 0x34c3c000, 0x4, 0x8}, {0x4, 0x7fff8, 0x100, 0x1ff, 0x2, 0x206a}, {0x40004, 0x0, 0x4, 0x100, 0x400, 0x6}, {0x8, 0x2541, 0x7f, 0x7f, 0x9, 0xff}, {0xad87, 0x4, 0x7, 0x8, 0x7, 0x12}, {0x7, 0x4, 0x0, 0x6, 0x80, 0x2}, {0x7fffffff, 0x5acf, 0x20, 0x1ff, 0x2}, {0x6, 0x3ff, 0x1, 0xddb2, 0x7fffffff, 0x7}, {0x3, 0x5, 0x2, 0x1f, 0x0, 0x4}, {0x1, 0x3ff, 0x6, 0x200, 0x8, 0x79c7}, {0xd94c, 0xa4ea, 0x101, 0x7ff, 0x81, 0x7}, {0x401, 0x10000, 0x1, 0xa9a, 0x100, 0x51}, {0x3f5, 0x4cfcbf3d, 0x20, 0xfffffe01, 0x8, 0x8}, {0x0, 0x800, 0xfffffff8, 0x7, 0x10001, 0x3ff}, {0x7, 0x3, 0x6, 0x2, 0xc5, 0xffff0001}, {0x5, 0x7, 0x5, 0x58c, 0x101, 0x9}, {0xfffffc01, 0x7, 0x200, 0x80000001, 0x2d, 0x100}, {0x20, 0x3e1, 0x3, 0x0, 0xf19b, 0xffffffff}, {0x24f, 0x200, 0xff, 0x8, 0x7}, {0x0, 0x5, 0x4, 0x200, 0x0, 0x6}, {0x7, 0x2, 0x4, 0x8, 0x1, 0x9}, {0x80, 0x23, 0x6, 0xffff, 0x8, 0x3}, {0x2, 0x8, 0x5, 0x80000000, 0x1, 0x1f}, {0x6, 0x10000, 0x8, 0x4, 0x1000, 0x7fffffff}, {0xff, 0x6e, 0x4, 0xfffffff7, 0x0, 0x6}, {0x4, 0xdd, 0x8, 0x3, 0x100}, {0x0, 0x4, 0x90, 0x5, 0x7}, {0xe000, 0x80000000, 0x10001, 0x9, 0xffffff44, 0x5}, {0x4, 0x8352, 0x800, 0x3ff, 0x8, 0x9}, {0xa35, 0x0, 0x0, 0x1dee, 0x400, 0x2}, {0x10001, 0x1, 0x101, 0x3, 0x3f, 0x5}, {0xe1d, 0x9, 0x3, 0x2, 0x3, 0x800}, {0x672a, 0x10001, 0x80, 0x1, 0x0, 0x8}, {0x2, 0x400, 0x8, 0x9, 0x1}, {0x12, 0x4, 0x1ca, 0x8, 0x7fff, 0x2}, {0x101, 0x5, 0x7, 0x3, 0xfff, 0x3}, {0x2, 0xffffc6d0, 0x81, 0x0, 0x3, 0x7}, {0x1, 0x8001, 0x8000000, 0xfffff001, 0x1000, 0x1000}, {0x0, 0x3647d318, 0x0, 0x1ff, 0x8, 0x1}, {0x3, 0x5, 0x7fffffff, 0x3, 0x1, 0x1ff}, {0x19, 0x81, 0x60, 0x5, 0x100, 0xfffffffd}, {0x3, 0x0, 0x7, 0x0, 0xffffffff, 0x8}, {0x2, 0x7, 0x7, 0x8, 0x5, 0x200}, {0x7fffffff, 0x99, 0x0, 0x1, 0x5, 0x164}, {0x99c, 0x1, 0x3, 0x5, 0x2, 0x13}, {0x20, 0x3, 0x7, 0x2, 0x9}, {0x6, 0x8, 0x9, 0x81, 0x0, 0x4}, {0x8, 0xfffff001, 0xc000, 0x1ff, 0x80000001, 0x1}, {0x0, 0x0, 0x7f, 0x6, 0x4, 0x1fe00000}, {0xe2, 0x1, 0x4, 0x1, 0x0, 0x3f}, {0x80, 0x0, 0x9, 0x1bca1ee3, 0x6, 0x8}, {0x8000, 0x40, 0x200, 0x3, 0x200, 0x80000001}, {0x7fff, 0x7fff, 0x7, 0x5267b158, 0x7f, 0x65a}, {0xd42, 0x4, 0xf73, 0x2, 0x20}, {0x1f, 0x1, 0xffffffff, 0x3f, 0x5, 0xccd0}, {0x3, 0x36890, 0x820, 0x2, 0x8, 0x45}, {0x100, 0x1f, 0xffff8000, 0x1ee1, 0x1, 0x81}, {0x7, 0xffff7fff, 0x4, 0x6, 0x6, 0x1}, {0x3ff, 0x6, 0x6a, 0x11f2ad65, 0x5, 0x2}, {0x8, 0x34060946, 0x3, 0x9, 0x7683c1dc, 0x9}, {0x7, 0x54d, 0x2, 0x0, 0xffff, 0xffff}, {0xffff0001, 0xfffffffb, 0xfff, 0x0, 0x9, 0x3f}, {0x10001, 0x1, 0x40, 0x7fff, 0x800, 0x4}, {0x5c56c2d9, 0x8000, 0x0, 0x4, 0x4, 0x7}, {0x5, 0x7, 0x78be, 0x6, 0x1, 0x6}, {0x399a, 0x9, 0x9, 0x0, 0x1, 0x3}, {0x3ff, 0x4, 0xe190d10, 0x7ff, 0x9, 0x80000001}, {0x6, 0x4, 0xfffff89e, 0xb18f, 0x439, 0xfffffffd}], [{0x2}, {0x1, 0x1}, {0x2}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x2}, {0x3, 0x1}, {0x3}, {}, {0x3, 0x1}, {0x2}, {0x6}, {0x7, 0x1}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x2}, {0x2, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x0, 0x1}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {0x5}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x1}, {0x2, 0x1}, {0x3}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0x2}, {0x1, 0x1}, {}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0xb370641f1c21af84, 0x1}, {0x3}, {}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x2}, {0x1}, {0x4}, {0x0, 0x1}, {}, {0x5}, {0x2b90e21447a7f912, 0x1}, {0x1028e771a8fde029, 0x1}, {}, {0x5, 0x1}, {0x4}, {0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x3}, {0x1, 0x1}, {0x4}, {0x2}, {0x5}, {0x1}, {0x1}, {0x4}, {0x0, 0x1}, {0x2}, {0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x3}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x4}, {0x2}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x5}, {0x4, 0x1}, {0x3}, {0x2}, {0x1}, {}, {0x5}, {0x0, 0x1}], 0x1}}]}, {0x7d, 0x6, "2645e6ae66775f672748dbd2263a0f10a856f84c61a1bf775ca98b9ea25e8b34fd2d5f37cb4f6984ea4730aa39a53921e5154fb8d084782f0a49707bb1fceeb92db8c12fbc9c438f1945c1518e40454475353012889948b16b0897d45bdeb33407091765623f40413069a520f42c657dff68e1f9fd51caf913"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}]}}]}, 0x1ed8}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0x2}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r5}}, 0x24}}, 0x0) 22:37:59 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x13, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x5}, 0x4) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000140)={0x8000, 0x80000000}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:37:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$KVM_SMI(r7, 0xaeb7) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:37:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = accept$packet(r4, 0x0, &(0x7f00000000c0)) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:37:59 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) connect$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1, 0x3}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x3}, &(0x7f0000000180)=0x28) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x8, 0x1000, 0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 659.980263] nla_parse: 171 callbacks suppressed [ 659.980269] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 660.019633] XFS (loop0): Invalid superblock magic number [ 660.060826] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 660.138220] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 660.186450] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 22:37:59 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95", 0xc1, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 660.232149] XFS (loop4): Invalid superblock magic number 22:37:59 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) connect$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1, 0x3}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x3}, &(0x7f0000000180)=0x28) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x8, 0x1000, 0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:37:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYRESOCT=r7], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000014c0)='task\x00') unlinkat(r8, &(0x7f00000011c0)='./file0\x00', 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 660.297747] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 660.365685] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 660.382772] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 660.399533] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 660.438039] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 660.461739] XFS (loop0): Invalid superblock magic number 22:37:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 660.481231] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 660.533308] XFS (loop4): Invalid superblock magic number 22:37:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) r7 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$sock(r7, &(0x7f0000000480)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x3, @multicast, 'nr0\x00'}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000380)="0dda15982459cb873b115b837535b2e6bb8d38235076e16c32ad211db8a4f06f8d0a8ed079b18e43ca35c5c58b5ecc07f72db721d88b55ab27548ec11b42a0a970744d1443761b38a909ca20638b450aadee8e06d5ab15c484f41ab8c19c010c42f7747d884572c6e3034e719433ce9c1cd88d07cc9ee2edba2758faaed9fd8558fbea0b6591770f6f7624691ae579bbe1d21e3aa8e3a5980275c982637e80b782172ac974896c8cd9b2ce597cb04f6e69fabb09f4b906b7c47df13315c190fd02a52e4e0d46548932ddbe1f9dc16bfb723e6149747bd6fdc9687251c26b", 0xde}, {&(0x7f00000002c0)="d5fbfa8b71cf9b78b8f07d0ce2474330c5b1a93e0a6e930f9e8dcfdcb8116a438a34e4ed60b121def8308b886ec95e33da2fd4a550f4089f18df20ddd71a13d7690d4fe63e", 0x45}, {&(0x7f00000005c0)="efe953d1dd84d84b4db075d1ccb70ea516c3f3c59526e5a2e121dafe010f60036a54a367c04321e59bfa997ec81951288c7dc85c87449fa8e9af2fb83928a6c8ef3b2f210fab3ec787d9d43ee18f8178fcde2c4d63a52fe1bf15e13065aba4d675b55d5f27e13381def5226f26edcd0a5dab0d78fccc84f31ef3bccc74c6d7c71d6139e2dbc96d99ad16950a", 0x8c}, {&(0x7f00000007c0)="065357d8557b745ee71032695bfa792a5e825060cb2dfc9c6771c60bb2962ef9f525999b68addba72d71e17822ded64c62c7ed0509f7632b9a1f221217b9950ef393ea38d55b4b001bf8eaf75b176007a525d77d5b1dc09b06a012689e94eec945eb5b2b1508aaca602e4ed994cb48aed080027cd24128bd3bf18d57f63bf00b5143ad0557e9d111346a3cb8724fb8f5f4f1de7015eb58eb3b57f4b3414ca29594a505dad4a99e51fcfa331ff349505562830ff2fd0f6dff2de00cffa599a65a53e90df3d4117e384856585285cc2459b63dc1698b1a6b9c5c98e1ee6c8610d3f86537", 0xe3}, {&(0x7f00000008c0)="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", 0xff}, {&(0x7f0000000140)="7d7e73dfef7ce6143e4d089e90", 0xd}, {&(0x7f0000000680)="eda2687101b2dc8723539dda96dc5daf6421b0dd02918801390711f6318021b0933de26a7f6bfd2a29c5821250b153fa514c574864b3e2bea90614dc261bfc33338e74ec528af7b1fb1b2707b04d665cdb6c0879fe22a03df524652b2d4ef74893585bf382e5674dc3179942e25d84b1c52d405dd82b8c2ea8d5f7251a3b8882340741a1b6dded1345409f74a6c829328eea3a9aa02ab82bd80349dabc4bd58f8db54903d25ed4c9fcae7a9616339f48fac1de6f9223", 0xb6}], 0x7, &(0x7f00000009c0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x60}, 0x800) 22:37:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) sendmsg$NFT_MSG_GETOBJ(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x13, 0xa, 0x801, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0xffffffffffffff02}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x11) umount2(&(0x7f0000000000)='./file0\x00', 0x14) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) sysfs$2(0x2, 0x286b, &(0x7f0000000380)=""/80) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x84, 0x0) ioctl$CHAR_RAW_SECDISCARD(r2, 0x127d, &(0x7f0000000180)=0x4) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '!!'}, {0x20, '&&!%$'}, {0x20, 'xfs\x00'}], 0xa, "a2f8d3e51adfa61df0783783b60aee3e26545a3c1e4c754489169fe691c64eac992d968f101fc67349a700c3252f373ca309a2408866b21e"}, 0x51) 22:37:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r2, &(0x7f00000002c0), 0x347) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000080)=0xb85) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$nl_rdma(0x10, 0x3, 0x14) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0xa, 0x0, 0x40, 0x8, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x50086, 0x6, 0x401, 0x1, 0xbf, 0x0, 0x1}, 0x0, 0x2, r2, 0x1) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="740000002400070500000000000000000000000029cc2a89235653048d79e97b54626fe2d3cca3233f53279da6104bdb8c7b094196e3525399d91c393de364bc38f7fef27a957c3f76d77f5539e4cfd921ee5af8a9919bee08a38f04599df2b1757c66a5d12ff29cdded3eab16c048f73bb179914cdb4cce516f0f3e01efa8b9d7a9a4250bb284fac2f59d3bd308260abcede2d88b5528deeea3b6a71ee71320bde3195226cd394651d170f7778fb518f0fc8470298dba31a7d78f30", @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@gettfilter={0x44, 0x2e, 0x800, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0xc, 0xffff}, {0x5, 0xffff}, {0x7, 0x9}}, [{0x8, 0xb, 0x40}, {0x8}, {0x8, 0xb, 0x6d8}, {0x8, 0xb, 0x7fffffff}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) 22:37:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:37:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x40210000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000000c0)={0x0, 0x40}) 22:38:00 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x109002, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x2, 0x3, 0x8, 0x1, 0x44}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd07, 0x0, 0x0, {0x0, 0x0, 0x4000, r7, {}, {0x0, 0x3}}}, 0x24}}, 0x0) 22:38:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000007c0)={0x208, 0x0, 0x3a2, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4c000}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 661.064957] XFS (loop4): Invalid superblock magic number 22:38:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="ff002827e7a2730200000000800000000000000000ce0cfa3c98a8000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@deltaction={0x0, 0x31, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x0, 0x1, [{0x0, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x0, 0x1, [{0x0, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0xffffffff}}, {0x0, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x5}}, {0x0, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x1}}, {0x0, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'connmark\x00'}}, {0x0, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x920}}]}, @TCA_ACT_TAB={0x0, 0x1, [{0x0, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x8000}}, {0x0, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'sample\x00'}}, {0x0, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x8001}}, {0x0, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'bpf\x00'}}, {0x0, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x2}}, {0x0, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x6}}, {0x0, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'ipt\x00'}}, {0x0, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x3322}}, {0x0, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x3}}]}]}, 0x24}}, 0x0) 22:38:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x40210000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000000c0)={0x0, 0x40}) 22:38:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000003000100000000000000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0x200, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 661.321518] XFS (loop4): Invalid superblock magic number 22:38:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400060500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 661.401243] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=3806 comm=syz-executor.3 22:38:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 661.462936] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=3816 comm=syz-executor.3 22:38:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0xc100, 0x0) recvfrom$llc(r7, &(0x7f0000000380)=""/225, 0xe1, 0x40000000, &(0x7f00000000c0)={0x1a, 0x30d, 0x5, 0x0, 0x4, 0x9, @random="0f16595b56be"}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES16, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 661.584418] XFS (loop4): Invalid superblock magic number [ 661.613061] XFS (loop0): Invalid superblock magic number 22:38:00 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYRES16, @ANYRESDEC], 0x74}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@deltfilter={0x298, 0x2d, 0x30, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x17fcc, 0xfff2}, {0x1, 0xffe0}, {0x2, 0x10}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x264, 0x2, [@TCA_U32_SEL={0x244, 0x5, {0x3, 0x4, 0x6, 0x3f, 0x9, 0x8, 0x1, 0xd2, [{0x7, 0x80000000, 0x7f, 0x1}, {0x3, 0xffff, 0x6, 0x1000}, {0x2, 0x0, 0x5}, {0x4, 0xfffffffa, 0x9, 0x5}, {0x8, 0x9, 0xc48, 0x2}, {0x0, 0x7fffffff, 0x5, 0x1}, {0x20, 0x40, 0x3ff, 0x3f}, {0x81, 0x7ae, 0x9}, {0x77a, 0x4, 0x7f, 0x7}, {0x0, 0x4, 0x54, 0x80}, {0x8, 0x58000000, 0x3, 0x2}, {0xffff8000, 0x7fffffff, 0x3}, {0xe8, 0x200, 0x8, 0xffff7fff}, {0x7fffffff, 0x5, 0x5300, 0x2}, {0x9, 0xb820, 0x1, 0x1}, {0x5, 0x1ff, 0x7fffffff, 0x9}, {0x401, 0x4, 0x7, 0x8001}, {0x7, 0x4, 0x6, 0x20}, {0x100, 0xad46, 0xebef, 0x800}, {0x401, 0x6, 0x9, 0xfffffffb}, {0x990a, 0x10001, 0x800, 0x6}, {0x7fffffff, 0x86, 0x81, 0x39f}, {0x7f43, 0x1000, 0x0, 0x3f}, {0x8, 0x2, 0xbc8, 0x6}, {0x10000, 0xfffffca6, 0x80000000, 0x2}, {0x52f, 0x2, 0x2455f1ad, 0x8}, {0x6, 0x56, 0x5, 0x5}, {0x3, 0x76, 0x8, 0xffffffff}, {0x6, 0x5, 0x6, 0x800}, {0x0, 0x21, 0x2, 0x7}, {0x81, 0x5, 0xcc, 0x7fff}, {0x4, 0x2, 0x8, 0xffff69cb}, {0x10000, 0xfffffff7, 0xfff, 0x9}, {0x4, 0x1, 0x1, 0x4}, {0x1000, 0xfffffffc, 0x7fff, 0x100}]}}, @TCA_U32_LINK={0x8, 0x3, 0x5}, @TCA_U32_INDEV={0x14, 0x8, 'team_slave_1\x00'}]}}, @TCA_CHAIN={0x8, 0xb, 0xffff7fff}]}, 0x298}}, 0x40000) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a0001007273767036000000040002003c8613fe875e82b91d237d0e24c2d85b2370abb712da1082c9a2b77dcfa1857252f2d433b5b7f9a94315e742bb5d0d1d00f18dedba9678e7ad"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r7, 0x800455d1, &(0x7f00000000c0)) ioctl$KVM_PPC_ALLOCATE_HTAB(r7, 0xc004aea7, &(0x7f0000000080)=0x9) 22:38:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0xc3a884cebc905dc3, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000300)={0x0, 0x6, 0x100d, 0x1}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB="7df7000200000000000008"], 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)={0x2dc, r7, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffff80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4768}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x626dee}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}]}, @TIPC_NLA_SOCK={0x40, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xb5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_BEARER={0xdc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5723}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc08}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6d0}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xeda2, @local, 0x1}}}}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0xa0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x140c5806}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa135}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5fa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4cd60abc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x20040000}, 0x1) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r6, @ANYBLOB="000000000000000000000000d431eecd9020d4b134ddcb5d7c5d2dd4f420560f85a37d3b74966316037b572155cd646b301854764be48719ce948be91563bce0e89a1ffc9f8fd162486e1f47583e08f2ac03922ba787ce"], 0x24}}, 0x0) 22:38:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 661.949102] XFS (loop4): Invalid superblock magic number 22:38:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="74000000240000000000105e61ff97679686a1fd9968d246946c9e7a11e5ac6107794c2ae1ff0847c1e1149f85a41a9025f1f68a480855134eec27c6b1d47bf33c21f657a89c91e8c6742e83eedce08a02b3a9ed5d07911172f424d02d660c651382da9afe1bd6ad", @ANYRES32=r5, @ANYBLOB="0000009602b701160faec70008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="4800f6ff2700270d00"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}, 0x1, 0x0, 0x0, 0x200400e5}, 0x40080) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$vim2m_VIDIOC_STREAMOFF(r6, 0x40045612, &(0x7f0000000080)) 22:38:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001600000028bd7000fed3df2500000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x2004c891) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3400000028002702000000000700000000002000", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r6, @ANYBLOB="feff002000000000000000ff"], 0x24}}, 0x0) 22:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) socket$inet_udplite(0x2, 0x2, 0x88) [ 662.254573] XFS (loop0): Invalid superblock magic number [ 662.320310] XFS (loop4): Invalid superblock magic number 22:38:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom(r1, &(0x7f0000000080)=""/33, 0x21, 0x0, &(0x7f00000002c0)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x0, 0xf}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xfffffffffffffffe}}]}, 0x34}}, 0x0) 22:38:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x22000, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/l2cap\x00') ioctl$SNDRV_PCM_IOCTL_STATUS64(r8, 0x80984120, &(0x7f00000005c0)) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r9, &(0x7f00000002c0), 0x347) ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f00000000c0)) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="4800000028ab270d00000000000000000000000009435e5a93a6a0478428c81d394a6a7a03289cf413ad022a2779dc1011", @ANYRES32=r7, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r7, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r7, @ANYBLOB="000000009b07004134a50000000100000000000000000000000000741f5da0c6517b08126dc9f312aba15446a79b129f41ebd2717a50025f4880fa31430c417580b01f10b40d4946c4c0655f577cdb36192725cb3ef17b3d63d215afa6126e342d99722dc02bc8ca2d06122b40b589c4282c806896fdae5b476c97c8c0543946212454c09c22662cfa8edd3801e439a77331c179ba31c6ec98392876a26d5f3c13269a5456baf540"], 0x24}}, 0x0) 22:38:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f0000000080)={0x6, 0x7, 'syz0\x00'}, &(0x7f00000000c0)=0x28) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) 22:38:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 662.525166] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43816 sclass=netlink_route_socket pid=4007 comm=syz-executor.2 22:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) 22:38:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) fcntl$setpipe(r6, 0x407, 0x2) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x528001, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000440)={'syztnl2\x00', 0x0, 0x0, 0x6, 0xfd, 0x9, 0x40, @private0, @private1, 0x7, 0x80, 0xad68, 0x3}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'gre0\x00', r8}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r7, 0xc0405519, &(0x7f00000000c0)={0x80000000, 0x5, 0x3f, 0x6, 'syz1\x00', 0x4fd1}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000380)={'erspan0\x00', r5, 0x20, 0x1, 0x4, 0x9, {{0x1a, 0x4, 0x2, 0x7, 0x68, 0x68, 0x9, 0x79, 0x4, 0x0, @remote, @multicast1, {[@end, @ra={0x94, 0x4}, @noop, @cipso={0x86, 0x33, 0x3, [{0x7, 0xe, "610dc5eeb01ec282c1baf069"}, {0x0, 0x9, "bbd78e9d2e9db4"}, {0x6, 0xa, "668d57f6c79b5f22"}, {0x5, 0x2}, {0x1, 0x7, "6277045a0f"}, {0x6, 0x3, 's'}]}, @ssrr={0x89, 0x1b, 0x82, [@multicast1, @empty, @loopback, @rand_addr=0x64010100, @loopback, @dev={0xac, 0x14, 0x14, 0x37}]}]}}}}}) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000260010002bbd7000fedbdf2500000000", @ANYRES32=r9, @ANYBLOB="0d0009000e0007000a00070004000a0004000a0004000a1104000a0004000a00"], 0x38}}, 0x2000c) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x4004) [ 662.626280] qfq: no options 22:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) [ 662.845550] XFS (loop4): Invalid superblock magic number [ 662.873704] XFS (loop0): Invalid superblock magic number 22:38:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000007c0)={0x208, 0x0, 0x3a2, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4c000}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r7, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="000000ff000000000800010071667100000000ebe80140ac4a7edc58e13d0574eaeb7ce45029e7b5535043fcb6c59a55d884777c3a853762bccbb249a30f916cb075af511da50ef3b83a4dd414bfe5b300eb0f074803b2cbc41a17461bef72ae8c36844b605ca0f3a6cbcc2c651ae08db058a4bf"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000002c0)={0x0, 0x2, 0x8, [], &(0x7f0000000140)=0x40}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x4) fchmodat(r6, &(0x7f00000000c0)='./file0\x00', 0x80) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x347) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000380)=[@text16={0x10, &(0x7f0000000300)="3e660f388043000f30660fc4192266f33e0f0119640f01cb660f38de73c20f0093060066b9820000400f329a4e00cb00b8ba000f00d0", 0x36}], 0x1, 0x24, &(0x7f00000003c0), 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x60000010) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000024000705000000000092fb0000000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000120716671"], 0x74}}, 0x0) close(r5) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB='\x00'/11, @ANYRES32=r7, @ANYBLOB="00000e0000000a00000000000a00010072737670360c00001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x10}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_SRC={0x14, 0x3, @local}]}}]}, 0x48}}, 0xc000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r7, @ANYBLOB="243b4a21ffffdfffffffff00594dae78f9941554e5125e7c83ebdecd27d8e81cf8b024aa75c1"], 0x24}}, 0x0) 22:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) [ 662.892942] XFS (loop4): Invalid superblock magic number 22:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$VIDIOC_G_AUDIO(r6, 0x80345621, &(0x7f00000000c0)) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) 22:38:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xe) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000380)=""/151) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:02 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a000100727376700db3a4c2ce0926226585000004000200"], 0x34}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@deltaction={0xf0, 0x31, 0x2de7d4f7cebb1b29, 0x70bd27, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7e6d64b1}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0x10, 0x34, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffff8}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}]}]}, 0xf0}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) write(r7, &(0x7f0000000080)="22612806be36150a74d9ad5fe5", 0xd) 22:38:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="10566237631cd216bcfc740000002405070500000000000000000000000036908fef1475edd460c0c86a55f8", @ANYRES32=r6, @ANYRESDEC=r7], 0x74}}, 0xd4840) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$sock_inet_SIOCSIFPFLAGS(r7, 0x8934, &(0x7f0000000080)={'ipvlan1\x00', 0xfff}) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080)={r9, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={r9, @in={{0x2, 0x4e21, @remote}}, 0xfffffff8, 0x8, 0x9, 0xb4fa, 0x5}, &(0x7f0000000140)=0x98) 22:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000080)) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500cce29d95ded9fc2b000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r3, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc880}, 0x4008101) r4 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$sock_inet6_tcp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYBLOB="000000000a0002000c80c20000000000"], 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r3, @ANYBLOB="020026bd7000fbdbdf250d0000000c00018008000300020000002c0001801400020076657468315f746f5f626174616476001400020067656e657665300000000000000000005800018008000100", @ANYRES32=0x0, @ANYBLOB="1400020064756d6d7930090000000000000000de470003000200000008000100", @ANYRESHEX, @ANYBLOB="140002006272696467655f736c6176655f31000014000200766c616e3000000000000000000000002c0001801400020076657468310000000000000000000000140002006272696467655f736c6176657f310000"], 0xd0}, 0x1, 0x0, 0x0, 0x20}, 0x4004080) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000100005001000000000000040", @ANYRES32=r4, @ANYRES64], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x8081) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x2c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {}, {0x3}}, [@TCA_RATE={0x6, 0x5, {0x3f, 0x81}}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) [ 664.325342] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4338 comm=syz-executor.1 22:38:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 664.397520] qfq: invalid weight 458756 [ 664.435009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4369 comm=syz-executor.1 22:38:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x4000010) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="48058a28c646bfb0a3c0bca45b08cc2b4cbb42da67a643845f3a85a000000028", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) [ 664.795839] qfq: invalid max length 252 22:38:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r3, &(0x7f00000002c0), 0x347) getsockopt$packet_buf(r3, 0x107, 0x6, &(0x7f00000007c0)=""/4096, &(0x7f0000000080)=0x1000) ioctl$sock_netdev_private(r1, 0x89fb, &(0x7f0000000380)="a7301a1d5ed0541b493f0417f54fb97fa51dbd8c96fb8fd44d1ff73116b5bf63b2dbbdc8197dd9d140e6f1613bb0c23477d0a42abc46395680d59ee1f752ef94cec7581ae54e5960af0f295dcd066326c0950f59907e40b11ab57ee3bc37008a37f1db949ccd3c7d2c450d7ca3fc1bfcccf9f937e59510f02f8d78dc15d269972c0c41bb7dc42cc80fd6fec579e8211cbf4df4a50fb82224d14ba556c98c24060545cf8174c1e212e402b6d4196d3b81a3d9711eb06daec76916208c6cd4a706f7c266d559487676a124e34adea0006f7dc38ceedbc6fb6c3ded9c3b74f0063cd9ad8c7c09") r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {0x7}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a000000000400020000000000000000"], 0x34}}, 0x0) [ 665.016186] nla_parse: 192 callbacks suppressed [ 665.016195] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. [ 665.042066] qfq: invalid max length 252 [ 665.046159] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 665.100711] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 665.126149] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 665.141003] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 22:38:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000080)) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 665.194129] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 665.215858] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00@\x00'/20, @ANYRES32=r6, @ANYBLOB='\x00'/12], 0x24}}, 0x0) 22:38:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x40) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r7, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r7, 0x100000001, &(0x7f0000000380)=""/221) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) [ 665.250756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 665.273637] qfq: no options 22:38:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) [ 665.314822] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 22:38:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) [ 665.384721] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 22:38:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="000000000000000000000000fcff00007272769fc7a4703600000004000200"], 0x34}}, 0x0) 22:38:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r2, &(0x7f00000002c0), 0x347) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000380)=""/227) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getpid() getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) 22:38:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) [ 665.634210] qfq: no options 22:38:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002800270d00ffffffffffffffff000000", @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a000100727376703600000004000200"], 0x34}}, 0x0) 22:38:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x347) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_SB_GET(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="100029bd7000fddbdf250b0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0000000080"], 0x3c}, 0x1, 0x0, 0x0, 0x805}, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0xd0, r5, 0x200, 0x70bd28, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x40}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0xfffff800}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x1800}, 0x0) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f00000000c0)) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r9}}, 0x24}}, 0x0) 22:38:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x100c0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x20080, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r8, 0x4161, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) 22:38:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf7", 0xbc, 0x3}, {0x0}]) 22:38:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 22:38:05 executing program 1: ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000500)=""/206) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYRESHEX=r2, @ANYRESOCT=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000105716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_G_EXT_CTRLS(r7, 0xc0205647, &(0x7f0000000140)={0xf9d0000, 0x3f, 0xff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d4, 0x1, [], @p_u32=&(0x7f0000000080)=0x77}}) read$snapshot(r7, &(0x7f0000000380)=""/173, 0xad) ioctl$CHAR_RAW_PBSZGET(r8, 0x127b, &(0x7f00000002c0)) syz_init_net_socket$rose(0xb, 0x5, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r3, &(0x7f00000002c0), 0x347) getsockopt$packet_buf(r3, 0x107, 0x6, &(0x7f00000007c0)=""/4096, &(0x7f0000000080)=0x1000) ioctl$sock_netdev_private(r1, 0x89fb, &(0x7f0000000380)="a7301a1d5ed0541b493f0417f54fb97fa51dbd8c96fb8fd44d1ff73116b5bf63b2dbbdc8197dd9d140e6f1613bb0c23477d0a42abc46395680d59ee1f752ef94cec7581ae54e5960af0f295dcd066326c0950f59907e40b11ab57ee3bc37008a37f1db949ccd3c7d2c450d7ca3fc1bfcccf9f937e59510f02f8d78dc15d269972c0c41bb7dc42cc80fd6fec579e8211cbf4df4a50fb82224d14ba556c98c24060545cf8174c1e212e402b6d4196d3b81a3d9711eb06daec76916208c6cd4a706f7c266d559487676a124e34adea0006f7dc38ceedbc6fb6c3ded9c3b74f0063cd9ad8c7c09") r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {0x7}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a000000000400020000000000000000"], 0x34}}, 0x0) 22:38:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x88, r6, 0x2, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x6}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x1}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xf7}]}, 0x88}, 0x1, 0x0, 0x0, 0x10000040}, 0x40000) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = accept4$rose(0xffffffffffffffff, &(0x7f0000000080)=@short={0xb, @remote, @remote, 0x1, @bcast}, &(0x7f00000000c0)=0x1c, 0x80000) ioctl$sock_inet_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000140)={'ipvlan1\x00', {0x2, 0x4e20, @loopback}}) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r5}}, 0x24}}, 0x0) 22:38:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r5, &(0x7f00000002c0), 0x347) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671", @ANYRESOCT, @ANYRES16, @ANYRESOCT=r5, @ANYRESOCT=0x0], 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000000010000093d5c687db37ae74000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 666.618262] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4702 comm=syz-executor.3 [ 666.743234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4702 comm=syz-executor.3 [ 666.756607] qfq: no options 22:38:05 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030000727e609681085cb4c7a077316bb73f8de6a4cdc8c07c865d6c644a3c999add5c73fcf0d039cad1c35ea6d924273ba40643a542fd82c9cb83bb45270d058cd91a5a18558a2960d45515861fca69557ed7bb5280cf9183d52feab81698c00092e9f18e9a70576a40c9fa2d48dd70debd42718e3102bdfa7a6922b90bbe5f60d5046077f0b202489e650df1ab519f4b437fa6ae96c525d3ea528561df48747df13566acbd04cb2590cc5728fcddbb3f18ab96ffd36b1afff80ecb5f9a8"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200780, 0x0) openat(r0, &(0x7f0000000200)='./file0\x00', 0x10600, 0x180) 22:38:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) recvmsg$can_bcm(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f0000000080)=""/117, 0x75}], 0x2, &(0x7f00000002c0)=""/122, 0x7a}, 0x10000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada", 0xb6, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) r5 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000540)={{0x2, 0x0, @identifier="1286a292ebb716d1925cef62782a4dd7"}, 0xfa, r5, [], "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"}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000380)={{0x2, 0x0, @identifier="13fa55fd5d3219d17d282b9da5d47bb0"}, 0xd7, r5, [], "92c042763544b29e27c21ee30d5ce7620115338b975298638d4e16bc7b4727814ee3c9ddcc87dce3023690c5cbc81ec6f1520d73ae2b141b3a470c22e2571f05992d69438f500e20c3eaf4235bbbace5265e9bec07072307d806aec194bde9b875a89dcac1f40b4b2fbd4347d912c5ee7893c366d877f9fdabe03af96a00758edfff571e9756b160dfd41cdbad4dbcc0c88432667afcfe0972f5825e8c3287bef6bcee44d0569aded36d76933e34e6a10e9c65ca608c4b36298235d3dcaf5f08ddb58128c69af4be83367308ab84f0180a50a95b9c3c57"}) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}]}, 0x28}}, 0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x90, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vcan0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x90}, 0x1, 0x0, 0x0, 0x40001}, 0x1) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x68, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x90}, 0x8810) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRESDEC=r8, @ANYRESOCT], 0x48}}, 0x4040004) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x2, 0x9, 0xa03, 0x0, 0x0, {0x8, 0x0, 0x8}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x80000001}}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x1}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x401}}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0xa}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000001}, 0x801) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 667.015459] XFS (loop4): Invalid superblock magic number 22:38:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400000, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000007c0)={"137782970947a4514fa7f2586ad0393012874ec5c37a988d311c4f6668287402536a108449802bd0baa4f97b9b0891eb8439a13156741ccb265dc584725a2e0387637e3e9703384c5b0cda787e4eb6db5881a8a406f446b72616f1de13c75f862e3571993f56082379d53298a749da717ebcc7733e6695d4fa36c78f017dc4efbe336674ccc6834b50315200b4ad5b1e277aef9fe6ddbd7d453995674fd5eac54e921a9d72b3929ac815651e5c9be52d0b610d64649f843b5afeaa007fdfa4aa73f10633eb904deb8629aa4e334c06e2e4aea4739603a5c7c7f1184f73f5c106f0a2a51f82c3642ff8274d1a9cf014e17c8f786ac9d05fc1561b06fe69a7a40227e0450b70ada92dffc5184d9d759e633ed24fa7d177cca6eb19d1577bf00d21c0d57b458b5667d8ee7acd98fef26f7efdd82b2b63787bc1f4d4ae89d913d233ab7aa62e6286d19fe309c79256feb5793429e608412570260011b908374225499c9af8dee9b8936e7945faff3bfa2a609c62c008ecd7ba96719091ade0cfca2855489a93fa1b4a980a8afc92581f43b542cca6149fe0e1bd925c543557d3b3f54b91bd7ff0f5fd8168395cf122fcba1024e97e22a595bb6ba076d6fadb46535bd5a82bce586febb4f89d45831245ce1c3e3658deabe58df8ccc023144ea8dae6e23bcc3bc94763849ce4ccc59d30b68a8b23081f1b80cdd7257a85da4c24af0b9e6ad449c163af322fccaf45325049b29f8daba598bbe4d3b03599f4fcfd7e7b19c0fb1641c5354fdc5e217cdb6c0917716a301782e32735bae0ca0032b86953ca59aba649155cfa0be1ac0f09bf951cea200b7219294c93ec9466d4a492b6c8f0b6c0f04fe677bfcdf36a23d9717238d0ea60bb588246c48ac8ab6227affd7dcbade60a8817a7753a6b0b2cb671ba4f62f67af00817e670f5cf0f6eec8723ca18c00a3e18d82c3dc96dd5d3830dae0b76f435c37336ac24975a1770b88283e9469583bd79adb93540d20f7d43b5b8d2189d1c6935ee44e5eac02d4600d7348c50a4ab24a52e30de2a1ec0d7c2aac60260d1dab31987c5a9be324b1c9b87f5051ca6c17bd3ad1b95ec8a99e2753252ba6caccf38e9469e0930d9cc2f25d7fabca3a5c09636e5a76afc5a83cc4103e0622abd339219e78cfd41f5ae95729d73faba1689b3dbe713205c07fb67f0469ae5e343c47577a8d6b21612e016b6aec1bdfd302b7b1fc2564c5904e2034943f5f49b405d92671c8c62d99e4ae614e692330d4b30eb11c05b343f5861aa55972dfa56f7d9498204d99c49e8f5e54088a466c90825dd76dab6ca7abc62666ca20057f3ffc94c6488fe2c4f83760c15a9574ba66fd31f7c07a425699259536ae3e31f4b079d6f9533432bc5d280ef4d0dde0d1bb23117857f874e70e6528566448c7659f7b84a0486ebc33b7f5418ab759f12"}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x9, 0x6a2000) mq_timedreceive(r7, &(0x7f0000000380)=""/212, 0xd4, 0x3, &(0x7f0000000140)) 22:38:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = add_key$fscrypt_provisioning(&(0x7f0000000080)='fscrypt-provisioning\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000380)={0x2, 0x0, "b9124b9c0e0db5a7fe84cdb65193f790396c8d10bb70bb6d5777bb8bf0a071be73ed92857d794b3db0db59411325c5c7a9bead6d4202c0db00b46d4e9c8b9cc3728e6fe4b6ea59969c20180111e88aa21061b137f30f790185ea5ab4bd2f19b6bc407caa62b3c99ed58e2c12aabb60ca96667b16e1c5012d740a04869f02f4fc47d24293b75ca35dad891ca27a310ea800aea3a8d7ae5458c15ead1c"}, 0xa4, 0xfffffffffffffffe) keyctl$invalidate(0x15, r7) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$AUDIT_GET(r5, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3e8, 0x200, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x20008001) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080)={r9, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x14) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000500)={r9, 0x1, 0x0, 0x3ff, 0x6, 0x4}, 0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 667.287915] XFS (loop4): Invalid superblock magic number 22:38:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca4803", 0x92, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) ioctl$VT_ACTIVATE(r7, 0x5606, 0x1) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 667.505426] XFS (loop0): Invalid superblock magic number 22:38:06 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r3, &(0x7f00000002c0), 0x347) accept4(r3, &(0x7f00000002c0)=@ipx, &(0x7f0000000100)=0x80, 0x0) 22:38:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="000000000012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname(r1, &(0x7f0000000080)=@xdp, &(0x7f0000000140)=0x80) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB='H\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a0001feb9a41570360000001800020014000200fe8000000000000000000524a18c2f22"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(0xffffffffffffffff, 0x40044104, &(0x7f0000000080)=0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000440)={@local, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000500)={'sit0\x00', r7, 0x4, 0xec, 0x6, 0x6, 0x4, @local, @local, 0x8, 0x30, 0x6, 0x1}}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000440)={&(0x7f0000000400)=[0x0, 0x7d, 0x2118ff49], 0x3, 0x0, 0x0, r6}) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040975c0957371a07c6ef8edc82133ab80217f365dd42ee1ffc3fc12672be0401791d9338becdefd11c9c94a2ca7b6e8a4cd4722a4697a223fec499041a36c6de85711a49ca2f859a349aa62b2bb47087aa652dc2e9dcfac0847d496b5f6cb6dd86cf55c5263396fb7878887c62cd82e15967a46c88d6fd21602e2a5f6452b80fa175f0adf55370fcd10000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400a80, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f00000002c0), 0x347) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r8, 0x89fa, &(0x7f00000000c0)={'sit0\x00', &(0x7f00000002c0)={'sit0\x00', r7, 0x4, 0x7, 0x6f, 0x2643, 0x32, @dev={0xfe, 0x80, [], 0x1d}, @loopback, 0x0, 0x720, 0x7, 0x1d6}}) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040", @ANYRES32=r7, @ANYBLOB="000075597d7cf92d820c00001830189c53af5384e0be058eb49e566851850ab52ec24341bb00a662404eeb80ab0ca38a94af8f32ee99f3ba1aeea2d84f1b8a635163d6fe392e55da12b9bfb0ab6295d44dec4e7a7c5fef6cd66c67e07583b244f58fc8"], 0x24}}, 0x0) [ 667.932651] XFS (loop0): Invalid superblock magic number 22:38:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') 22:38:07 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r3, &(0x7f00000002c0), 0x347) accept4(r3, &(0x7f00000002c0)=@ipx, &(0x7f0000000100)=0x80, 0x0) 22:38:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="74000024fa0705e7ffffffffffffff0000200000a4499146c7015d9e6d5664e9f9d57626e242d2d2b779960511c13b087ee0b9a23b93ac1310e2aeb997f76d9598f6c3cc16f1046443622cf84956c41ca3574d818328dbe49e388f57c473c5cceeaec8ff2c620751800601bd03c8174a6a708622f737dc18b0159966d49e766b", @ANYRES32=r6, @ANYBLOB="00000000ffffffffc5bf7db208000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 668.042063] XFS (loop4): Invalid superblock magic number 22:38:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000080)={r8, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={r8, 0x8, 0xf001}, &(0x7f00000002c0)=0x8) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 668.399657] XFS (loop4): Invalid superblock magic number 22:38:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="48000000100005070000000010810000000040403a73b7c2741edd434e5e6b6180ec92e3b12de39426a61d3cd2e5217ca1d45cf3e1952acbfc408b", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/82, 0x52}, {&(0x7f0000000140)=""/40, 0x28}], 0x2) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) bind$rds(r7, &(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000001100270d001e0b51a2bee5569ede9e40114bf35d4407facc51746084d7dd6069a25fbc2cac10a7f34c6ba8d02cc00c8fa3a5e0900e5b6741e045089a81c6be572c71ecc1211593cf088a6cdef64bcd28ed485fe2a86858309fc0e610988b484bf2df998e0f77172401950bccb6d6987a4e59bdb19967623dcc6a2bc75b8b7257b9bea32ba0665ad1898a7d88413b6487a949450a447d44aa0ff523157a3b5be8373c172911c9297e2fd52a2f97", @ANYRES32=r6, @ANYBLOB='\x00'/12], 0x24}}, 0x0) 22:38:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x27, 0x803, 0x4) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x86c00) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) syz_read_part_table(0x3, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000380)="678c362a853cbd729d9166f76726cf6dfcb11fb921325e3bf07d3067a9d3196b04776939d08afeb3f90b25556b3b4bf14eeba641e3afb6d8a8c65e12f0adc6701147b658e0cbd8f1c6e18b20d5a5fce327bf18a2d14ce9ca1e8ea64565723d8d95ae258566701b924e8f302bdba18db0f6fea155f302f9dca8821f40b8e4f7982fc577c7505090c1bde78010957c554662aa0559ddc811c8a5295f2049f6f226c3576c22e281c8beb620f819e7dc7e438292485b180d18db030d40a6d6590073", 0xc0, 0x401}, {&(0x7f00000002c0)="6b57fe8f1c5fd40725a88b601de3a5155be9f0a6d5cbf1fdaa034db0c19b96dd5a3718adc81ad52e378d2fd8bb0ef3511ae9e3c78c00f5a6e21507cfce910b77053370", 0x43, 0xffffffff}, {&(0x7f00000005c0)="63c12e8de65b957d025b691428dcd42aa9b99dc79d49f145df5796b56fd7d6efad10cd08bf321d357d88c479cb4d73c4c4091d7c154f3410120ef49a71ab0810ef6d4de173d6df91d2777bc7c1396802ce2493b30a4caddd34f152700398415e5cf84f31a90393d6a302285154e0fb2209af38eded2668d2feacf9f5cd32cd2b39496638e3c9c2e36833cedd68bbc694e647f1824765f2cc5d07d4d57cef6490771abe818336ea1e4b20e16f7bdb9e2034b0702984906982baf739032cf8b823e4a8bd544398b906e19d66d6c52970a2aa87532c375220cdbf85e08a647ea1c31c86af4b9da663a396880dc2a4b4000e", 0xf0, 0xfffffffffffffffc}, {&(0x7f0000000440)="fb9d9b0f2c2af6830455c0cbbb8d029cad73b1d5adb2bc89a6ea41966952795d560ca08f1fea7e7281c5ec6221461092fe7a56661658c1c8ff225183e00934758f8fc80e052c", 0x46, 0x6}, {&(0x7f0000000500)="e3f4cbd0d27680d09b3044cd620ade476b3e05603f742de77b5b9a600a1410e371f580f79ff6cad93c69cb5c0ff25a57ff6ecf22945113f796c4abd9e158fe4cff1716986ebe41ab261298032b1047c3049f68e04c", 0x55, 0x3}]) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) [ 668.746127] XFS (loop0): Invalid superblock magic number [ 668.776239] XFS (loop4): Invalid superblock magic number 22:38:07 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r3, &(0x7f00000002c0), 0x347) accept4(r3, &(0x7f00000002c0)=@ipx, &(0x7f0000000100)=0x80, 0x0) 22:38:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newtfilter={0x2c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@TCA_RATE={0x6, 0x5, {0x0, 0x80}}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) ioctl$SIOCAX25GETUID(r4, 0x89e0, &(0x7f0000000080)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r6}) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x2, @broadcast, 'bridge_slave_1\x00'}}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x34, 0x28, 0x927, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@TCA_RATE={0x6, 0x5, {0x2}}, @TCA_CHAIN={0x8, 0xb, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@newtfilter={0x34, 0x28, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r8}}, 0x24}}, 0x0) 22:38:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="41110000000000002c001e000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="7400000024000705000000000000000000000000288cca640aea9c83fa0256d4ab09684db2ae128babfb16df10d0cfe01a1158f249c5484d795226fe7af44809b3a665a4d5542d365b28ff10db1e0739b3732c7d8b589c17bfe54938f68660238bda3cd043b78d3f21d90b9f0a", @ANYRES32=r6, @ANYBLOB="00f5c300ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f00000002c0), 0x347) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x801) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x0, 0x324, 0x1, r7, 0x0, &(0x7f0000000080)={0x9c0903, 0x2, [], @value64=0x5}}) ioctl$CHAR_RAW_SECTGET(r9, 0x1267, &(0x7f0000000140)) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@gettfilter={0x44, 0x2e, 0x4, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0xfff1, 0xffff}, {0x2, 0x5}, {0x4, 0x6}}, [{0x8, 0xb, 0x6}, {0x8, 0xb, 0x8001}, {0x8, 0xb, 0x90}, {0x8, 0xb, 0x59e8}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 669.048825] qfq: no options 22:38:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x50000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f00000002c0)={0x0, 0xa, 0x0, [], &(0x7f0000000140)=0x20}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700000000100000000000004057bbafb51f34e8c73a93d2dc39f68063fa4bc83dd25153d6caa08c4abc572f0fa36de9d15b310b9ac23695aa7eb2c964a05dff4e378f95051c54fe4b5755dcea346ee0fe569c9e178335cdfc19510e9de72edbaf999ab97c75ed3d488355e0b95ba8c44c397a5be581d493e8f19f330edf6d562bd5ccd1af79f561104edf20fd610e0bab66ca5ef520352b6ace1063813c2424000000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB='H\x00\x00\x00(\r\x00'/18, @ANYRES32=r7, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b40)=@delqdisc={0x378, 0x25, 0x1, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xfff2, 0x2}, {0x6, 0xd}, {0xf, 0xe}}, [@TCA_STAB={0xec, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0x52, 0x1, 0x0, 0x2, 0x0, 0x1, 0x7}}, {0x12, 0x2, [0x8, 0x0, 0x9, 0x4, 0x70f, 0x5, 0x1]}}, {{0x1c, 0x1, {0x81, 0x0, 0x0, 0x80000001, 0x0, 0x1, 0x800, 0x2}}, {0x8, 0x2, [0x4, 0x3]}}, {{0x1c, 0x1, {0x2, 0x7f, 0x6, 0x1, 0x1, 0x5, 0xd8f, 0x5}}, {0xe, 0x2, [0x5, 0x3ff, 0x5, 0x50a2, 0x8]}}, {{0x1c, 0x1, {0xff, 0x4, 0x7, 0xf4, 0x2, 0x51, 0x0, 0xa}}, {0x18, 0x2, [0x0, 0x0, 0x4, 0x2, 0x3ff, 0x800, 0x2, 0x1, 0xfa, 0x9]}}, {{0x1c, 0x1, {0x7f, 0x3, 0x2, 0x2, 0x0, 0x3, 0x7ff, 0x9}}, {0x16, 0x2, [0x0, 0x4, 0x55b, 0xf0e9, 0x9, 0x6, 0x101, 0x1, 0x9]}}]}, @TCA_STAB={0xf4, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0x1e, 0x7, 0x7fffffff, 0x0, 0x7032318b, 0x1, 0x6}}, {0x10, 0x2, [0x8, 0x0, 0x100, 0x5, 0xfc00, 0x3f]}}, {{0x1c, 0x1, {0x8e, 0x9, 0x3, 0x9, 0x2, 0x7fff, 0x40, 0x1}}, {0x6, 0x2, [0x3]}}, {{0x1c, 0x1, {0x7, 0x5, 0x1, 0x4, 0x1, 0x7, 0xfff, 0x1}}, {0x6, 0x2, [0xf74f]}}, {{0x1c, 0x1, {0x5, 0x69, 0x98bc, 0x3f, 0x0, 0xffffffff, 0xffff8001, 0x6}}, {0x10, 0x2, [0x7ff, 0xf800, 0x3f, 0xe, 0x2, 0x9]}}, {{0x1c, 0x1, {0xe8, 0x20, 0x5, 0x7f, 0x2, 0x0, 0x21b1, 0x1}}, {0x6, 0x2, [0x2]}}, {{0x1c, 0x1, {0x6, 0x6, 0x1, 0xc6fc, 0x1, 0x2ee, 0x5, 0x5}}, {0xe, 0x2, [0x80, 0x4, 0x8, 0x8000, 0x101]}}]}, @qdisc_kind_options=@q_pie={{0x0, 0x1, 'pie\x00'}, {0x0, 0x2, [@TCA_PIE_BETA={0x0, 0x5, 0xd}, @TCA_PIE_BETA={0x0, 0x5, 0x12}, @TCA_PIE_LIMIT={0x0, 0x2, 0x1000}, @TCA_PIE_LIMIT={0x0, 0x2, 0x800}]}}, @TCA_STAB={0x16c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x75, 0x4, 0x0, 0x2, 0x99, 0x101, 0x3}}, {0xa, 0x2, [0x0, 0x9, 0x9409]}}, {{0x1c, 0x1, {0x9, 0xe1, 0x9, 0x7, 0x0, 0x0, 0x4, 0x7}}, {0x12, 0x2, [0x2, 0x1, 0x4, 0x1000, 0x3, 0x0, 0x8]}}, {{0x1c, 0x1, {0x6, 0x8, 0x2, 0x80, 0x0, 0xb, 0xf57}}, {0x4}}, {{0x1c, 0x1, {0x6, 0x8f, 0x91, 0xd174, 0x2, 0x1f000000, 0x40, 0x2}}, {0x8, 0x2, [0x1ff, 0x200]}}, {{0x1c, 0x1, {0x80, 0x6, 0x9, 0xfffffe00, 0x2, 0xffff0000, 0x1, 0x4}}, {0x2, 0x2, [0x9, 0x9, 0xfff8, 0x6]}}, {{0x1c, 0x1, {0x6, 0x3f, 0x7ff, 0x1f, 0x5, 0x0, 0x7, 0x2}}, {0x8, 0x2, [0x22e0, 0x401]}}, {{0x1c, 0x1, {0x3, 0xd3, 0x2, 0x5, 0x1, 0x1, 0x8003, 0x2}}, {0x8, 0x2, [0x8, 0x688]}}, {{0x1c, 0x1, {0x4, 0x3, 0x7, 0x6, 0x0, 0x1, 0x7ff, 0xa}}, {0x18, 0x2, [0x2a07, 0x40, 0x7, 0xfeff, 0x1, 0x4, 0x4, 0x101, 0x22, 0xbb]}}, {{0x1c, 0x1, {0x6, 0x9, 0x8e, 0x5, 0x1, 0x8, 0x6, 0x11}}, {0xc, 0x2, [0x7f, 0x1ff, 0x200, 0x8]}}]}]}, 0x378}}, 0x0) connect$pppoe(r6, &(0x7f0000000080)={0x18, 0x0, {0x2, @dev={[], 0x19}, 'tunl0\x00'}}, 0x1e) 22:38:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000002800270d000000000000000000007ee2ac00"/31, @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a00010072737670360000001800020014000200fe8000000000000000000000000000aa"], 0x48}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) r7 = accept(r2, &(0x7f00000002c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f00000000c0)=0x80) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000140)={0x2, 0x9, 0xfffffffffffffffd}) fcntl$notify(r6, 0x402, 0x2) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="00c6f88cac1e000100000000ff1000000a000100727376703600000004000200"], 0x34}}, 0x0) 22:38:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001100270d000000000000000000000040ad0d83cdbe815902c99570b4edae4d", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\n\x00\x00\x00'], 0x24}}, 0x0) [ 669.090971] XFS (loop4): Invalid superblock magic number 22:38:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 669.271229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3368 sclass=netlink_route_socket pid=5148 comm=syz-executor.2 [ 669.324773] XFS (loop4): Invalid superblock magic number [ 669.363924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3368 sclass=netlink_route_socket pid=5157 comm=syz-executor.2 [ 669.480978] XFS (loop0): Invalid superblock magic number 22:38:08 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="84000000bc367867cec2e4debc3658342943f93f36a1764a059132af3a5b5bb665e7874b623c2b2ba9c3a71f185799f232908e7125ebcc55993bef4e44f4ae87646a5a1757b92c3f29dc275879e6044cb82c1d2f6ee2aa1dd60fc99723ca522ba3c42c45c1f2223be358368cb8c47772d74dd21028bfb3012757d322111d3e124f1c46036ff1ef932d5541a5f942e552bda8af2eb5e77ca1cda5f6ab5004c7241446c6c728b0301a3f4fb78775502ceb99e82e3945b2380b539957a280e8f72ffa59e3c7c8279f4a1bf7628a457d63593a10029c26b9d780d1aa4014c92a4cd55ff6d95cd0329ca84079000000000000c690df4754d5bf3d4e3de2b02097d09c537cba2bc815ca0c5dec5bbc484970ce9be80d9ea72da6aceed688d8f1c2b44aca3a92a56cfb6e06228cb54e4779e37c632c9f86dec2850582d581c6d16bd074e4c351b7c02c42fc6c3cc8c5877009264bc0a7055be7617b3f7aa359c03955b60d17e76aa1beac44264503351640724f52815e6d14228be3b496230152cfae2d7b678d88276d64e30fa6fecd350eaac263f7f32fe36666d563afef64ab8e6e59240e6ab28a9ae563a22a68bf7f80076049d545a5bccf1f8ae8917d9cde1bfe3a76efd38d6fe8a1e885535149987564", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r3, &(0x7f00000002c0), 0x347) 22:38:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) ioctl$TIOCGICOUNT(r6, 0x545d, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="740000e8768412e67af624000705000000000000", @ANYRES32=r6, @ANYBLOB="080081009766711e221f3066a48fe524ecbc3035596990d60eccef495cb8a35d06aeb00a1d0789136b016a3a37179a25254267d0f09d1c590457d5d3eb554523f7ab9c732e606ee20ddc9741d02947cbb8b37bf2a7279d4826"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r7 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x7, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000140)={0xa10000, 0x8, 0x3, r3, 0x0, &(0x7f00000000c0)={0x980905, 0x0, [], @p_u32=&(0x7f0000000080)=0x9}}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}, @in6={0xa, 0x4e24, 0x400, @local, 0x10000}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfffffffa}, @in6={0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x22}, 0x2}, @in6={0xa, 0x4e20, 0x81, @private2={0xfc, 0x2, [], 0x1}, 0x3}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e22, @empty}], 0xd0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) [ 669.939265] XFS (loop4): Invalid superblock magic number [ 670.065872] nla_parse: 205 callbacks suppressed [ 670.065880] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 670.103562] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 22:38:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 670.125613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 670.147738] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 670.161354] XFS (loop4): Invalid superblock magic number [ 670.233074] XFS (loop1): Invalid superblock magic number [ 670.267546] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 670.295263] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 670.352987] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 670.397512] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 670.451573] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 670.486702] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 670.492225] XFS (loop0): Invalid superblock magic number 22:38:09 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) 22:38:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x2480, 0xc0) write$P9_ROPEN(r7, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0x40, 0x0, 0x1}, 0x475}}, 0x18) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r6, &(0x7f00000002c0), 0x347) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=r6], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r5}}, 0x24}}, 0x0) 22:38:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 670.844891] XFS (loop1): Invalid superblock magic number 22:38:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r2, &(0x7f00000002c0), 0x347) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000380)={0x16, 0xfffffd1b, 0xfa00, {&(0x7f00000002c0)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e24, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r3}}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0xa, 0x2, 0xd) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0xfffffffffffffe2d, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x40d7) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) syncfs(0xffffffffffffffff) writev(r8, &(0x7f00000002c0), 0x347) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x40) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000080)=0x5, 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) [ 670.993708] XFS (loop4): Invalid superblock magic number 22:38:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x347) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r4, &(0x7f00000002c0), 0x347) r5 = dup3(0xffffffffffffffff, r4, 0x80000) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000000140)) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r6, 0x0, 0x2d, &(0x7f0000000380)={0x3, {{0x2, 0x4e24, @rand_addr=0x64010100}}}, 0x88) writev(r8, &(0x7f00000002c0), 0x347) sendmsg$nl_route_sched(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x54, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x24, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x4, 0xde, 0x3}, {0x8, 0xdb7, 0x5}, 0x21, 0x7f, 0x98}}]}}]}, 0x54}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffe0}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) 22:38:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 671.197219] XFS (loop1): Invalid superblock magic number [ 671.204988] XFS (loop0): Invalid superblock magic number 22:38:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:10 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@deltaction={0x84, 0x31, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x48, 0x1, [{0x10, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x14, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x28, 0x1, [{0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}]}, 0x84}}, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB='\x00'/12], 0x24}}, 0x0) [ 671.313242] XFS (loop4): Invalid superblock magic number 22:38:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r7, &(0x7f00000002c0), 0x347) bind$rds(r7, &(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000001100270d001e0b51a2bee5569ede9e40114bf35d4407facc51746084d7dd6069a25fbc2cac10a7f34c6ba8d02cc00c8fa3a5e0900e5b6741e045089a81c6be572c71ecc1211593cf088a6cdef64bcd28ed485fe2a86858309fc0e610988b484bf2df998e0f77172401950bccb6d6987a4e59bdb19967623dcc6a2bc75b8b7257b9bea32ba0665ad1898a7d88413b6487a949450a447d44aa0ff523157a3b5be8373c172911c9297e2fd52a2f97", @ANYRES32=r6, @ANYBLOB='\x00'/12], 0x24}}, 0x0) [ 671.535558] XFS (loop1): Invalid superblock magic number 22:38:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:38:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)=0x8000) 22:38:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:38:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:38:11 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) 22:38:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000680)=ANY=[@ANYBLOB="0000000039689edf9f560f0000ecffffffff8ccdac7c0e19599fdf13dbe02f88ffc64688e7c6c56667f96f34ad060e40910ce7eb78cc1b272b000000000000358d9c43a912635849da11a70d5750dbf2bf178f6e54d41303d77bc0b69563a1a3ebccc8600e0be25c02a892dc377b037c9d15109f796cf2f04959e22d22a85d8ce9fc4a7cff35c500"/150], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x8000, &(0x7f0000ffa000/0x1000)=nil, 0x4) syz_read_part_table(0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea2bdc9c1587a050000000000000042e33089754c8107c3cd4623dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb7bb50ec93c152fa483198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b0674cc5c1e298a16324fe27da2a908ba9ff3c009d36d691cc7911219a2fd5d", 0xc0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000240)=""/250, 0xdb, &(0x7f0000000580)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) keyctl$revoke(0x3, r2) pkey_alloc(0x0, 0x1) r3 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000008, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x347) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000480)={0x1f, 0x0, @none}, &(0x7f0000000500)=0xffffffffffffffc2, 0x40000) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000540)=0x3, 0x2) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:qemu_device_t:s0\x00', 0x23, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:38:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 672.473540] XFS (loop1): Invalid superblock magic number [ 672.479453] XFS (loop4): Invalid superblock magic number [ 672.638055] XFS (loop2): Invalid superblock magic number [ 672.644848] XFS (loop0): Invalid superblock magic number 22:38:11 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 22:38:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:11 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) 22:38:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 672.950057] XFS (loop1): Invalid superblock magic number [ 672.970299] XFS (loop4): Invalid superblock magic number 22:38:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 673.036270] XFS (loop2): Invalid superblock magic number 22:38:12 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="84000000bc367867cec2e4debc3658342943f93f36a1764a059132af3a5b5bb665e7874b623c2b2ba9c3a71f185799f232908e7125ebcc55993bef4e44f4ae87646a5a1757b92c3f29dc275879e6044cb82c1d2f6ee2aa1dd60fc99723ca522ba3c42c45c1f2223be358368cb8c47772d74dd21028bfb3012757d322111d3e124f1c46036ff1ef932d5541a5f942e552bda8af2eb5e77ca1cda5f6ab5004c7241446c6c728b0301a3f4fb78775502ceb99e82e3945b2380b539957a280e8f72ffa59e3c7c8279f4a1bf7628a457d63593a10029c26b9d780d1aa4014c92a4cd55ff6d95cd0329ca84079000000000000c690df4754d5bf3d4e3de2b02097d09c537cba2bc815ca0c5dec5bbc484970ce9be80d9ea72da6aceed688d8f1c2b44aca3a92a56cfb6e06228cb54e4779e37c632c9f86dec2850582d581c6d16bd074e4c351b7c02c42fc6c3cc8c5877009264bc0a7055be7617b3f7aa359c03955b60d17e76aa1beac44264503351640724f52815e6d14228be3b496230152cfae2d7b678d88276d64e30fa6fecd350eaac263f7f32fe36666d563afef64ab8e6e59240e6ab28a9ae563a22a68bf7f80076049d545a5bccf1f8ae8917d9cde1bfe3a76efd38d6fe8a1e885535149987564", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) 22:38:12 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 673.615931] XFS (loop2): Invalid superblock magic number 22:38:12 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) 22:38:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 673.907027] XFS (loop2): Invalid superblock magic number [ 673.913734] XFS (loop0): Invalid superblock magic number 22:38:12 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 674.308952] XFS (loop4): Invalid superblock magic number 22:38:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 674.397059] XFS (loop1): Invalid superblock magic number [ 674.543809] XFS (loop2): Invalid superblock magic number 22:38:13 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:38:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:13 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:13 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 674.692806] XFS (loop4): Invalid superblock magic number 22:38:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 675.023501] XFS (loop2): Invalid superblock magic number 22:38:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 675.094245] XFS (loop4): Invalid superblock magic number 22:38:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 675.157578] nla_parse: 57 callbacks suppressed [ 675.157585] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 675.180721] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 675.227027] XFS (loop1): Invalid superblock magic number [ 675.341396] XFS (loop2): Invalid superblock magic number 22:38:14 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:38:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 675.471214] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:14 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:38:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 675.537416] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6c6f6f70300704f20b2cd4477ca5b629370082fb72acc576d0f1946872e09d41baf32572bddb7afc25e181a877"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x10) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/11], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 675.723812] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 675.888715] XFS (loop2): Invalid superblock magic number [ 675.894994] XFS (loop4): Invalid superblock magic number 22:38:15 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 22:38:15 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x10) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/11], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:15 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:15 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x10) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/11], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) [ 676.104928] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:15 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 676.272844] XFS (loop2): Invalid superblock magic number [ 676.285416] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:15 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:15 executing program 4: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 676.632441] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 676.644679] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:15 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) r2 = dup2(r0, r1) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="02002a2abdb300fbdbdf251f00000008009a0002000000050092007b0000000400cc000600210062000000080001000000000008009a00010000000400cc003c002280080007007f000000080004000100000008000700060000000800020004000000080004f72a0fb8df743bbd7463558a5076f421000200000008000600090000000400cc00"], 0x84}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000814) 22:38:15 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x10) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/11], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:15 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000540)='\x90\x00', &(0x7f0000000580)='xfs\x00', &(0x7f00000005c0)='xfs\x00', &(0x7f0000000600)='.&', &(0x7f0000000640)='{\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='xfs\x00', &(0x7f0000000700)='&:+\x00', &(0x7f0000000740)='bh']) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="12029b560832721732e90d668f9b1658a1828463ae6b174635bef2cc7a4ba7990a1df22ee26985e244d2a1bfb4f0f9b7c25f9a8c56014e2ec34e2a25818e07db8ac88b63552c2362020249b4aa3e1d9bb7892ca983a9", 0x56, 0x101}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='bh,errors=remount-ro,noauto_da_alloc,fsmagic=0x0000000000000007,fowner>', @ANYRESDEC=r1, @ANYBLOB=',smackfsfloor=/dev/loop,euid=', @ANYRESDEC=r2, @ANYBLOB=',subj_role=$:,measure,subj_role=.&,uid=', @ANYRESDEC=r4, @ANYBLOB="1c5b", @ANYRESDEC=r6, @ANYBLOB=',\x00']) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:15 executing program 4: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:15 executing program 4: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 676.815980] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 676.975703] XFS (loop2): Invalid superblock magic number 22:38:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x140f, 0x4, 0x70bd25, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'issm\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x7, 0x45, 'cm\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xb, 0x45, 'uverbs\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x7, 0x45, 'sa\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x24000040}, 0x34044018) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:38:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 677.135345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5135 sclass=netlink_route_socket pid=6179 comm=syz-executor.1 22:38:16 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') writev(r1, &(0x7f00000002c0), 0x347) dup2(r0, r1) 22:38:16 executing program 4: mkdir(0x0, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000540)='\x90\x00', &(0x7f0000000580)='xfs\x00', &(0x7f00000005c0)='xfs\x00', &(0x7f0000000600)='.&', &(0x7f0000000640)='{\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='xfs\x00', &(0x7f0000000700)='&:+\x00', &(0x7f0000000740)='bh']) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="12029b560832721732e90d668f9b1658a1828463ae6b174635bef2cc7a4ba7990a1df22ee26985e244d2a1bfb4f0f9b7c25f9a8c56014e2ec34e2a25818e07db8ac88b63552c2362020249b4aa3e1d9bb7892ca983a9", 0x56, 0x101}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='bh,errors=remount-ro,noauto_da_alloc,fsmagic=0x0000000000000007,fowner>', @ANYRESDEC=r1, @ANYBLOB=',smackfsfloor=/dev/loop,euid=', @ANYRESDEC=r2, @ANYBLOB=',subj_role=$:,measure,subj_role=.&,uid=', @ANYRESDEC=r4, @ANYBLOB="1c5b", @ANYRESDEC=r6, @ANYBLOB=',\x00']) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') 22:38:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:16 executing program 4: mkdir(0x0, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r0, 0x4) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465762f6c6f6f7036fc4f8641c70c61085fb89cc178004a7347052927953e9c4fc9f3339c2a82f7dee9046f9ec09406a2b16944da0163e1a71712146cb42ec6bdac133863b4d737fe43785196d5215aca04875ccb053db673a99b9156447a70204543e9ff30ae4584928a7a32ca1d7d10ea0d551b11ef133fa12802d1d391b84d286350a111dac18c904c3a967d25c1e039d31f3ebd9179e999ff9278e22499a13e7e22f5ac36a5a8e23bd0fff6fbe907509af333fc6f2ee8ec1efb348c46276fc7f944959f78518b86c1c7e35616272284"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v1={0x2, "291ee25357ad7688ae368309f89aa91fa246"}, 0x13, 0x1) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "9e1fce89943a24bb4956ef8b9c28a90accd5"}, 0x13, 0x2) 22:38:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') [ 677.465000] XFS (loop2): Invalid superblock magic number 22:38:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r0, 0x4) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465762f6c6f6f7036fc4f8641c70c61085fb89cc178004a7347052927953e9c4fc9f3339c2a82f7dee9046f9ec09406a2b16944da0163e1a71712146cb42ec6bdac133863b4d737fe43785196d5215aca04875ccb053db673a99b9156447a70204543e9ff30ae4584928a7a32ca1d7d10ea0d551b11ef133fa12802d1d391b84d286350a111dac18c904c3a967d25c1e039d31f3ebd9179e999ff9278e22499a13e7e22f5ac36a5a8e23bd0fff6fbe907509af333fc6f2ee8ec1efb348c46276fc7f944959f78518b86c1c7e35616272284"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v1={0x2, "291ee25357ad7688ae368309f89aa91fa246"}, 0x13, 0x1) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "9e1fce89943a24bb4956ef8b9c28a90accd5"}, 0x13, 0x2) 22:38:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:16 executing program 4: mkdir(0x0, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:16 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='veth1\x00') dup2(r0, r1) 22:38:16 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:16 executing program 2: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') 22:38:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e22, @private=0xa010101}, 0x108, 0x0, 0x0, 0x0, 0x83, &(0x7f00000000c0)='wg0\x00', 0x81, 0x100000000, 0xffff}) writev(r0, &(0x7f00000002c0), 0x347) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000440)) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:16 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:17 executing program 2: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 678.145622] XFS (loop1): Invalid superblock magic number 22:38:17 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(r0, r1) 22:38:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000100)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0), 0x10) 22:38:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:17 executing program 2: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r6}}, 0x24}}, 0x0) 22:38:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000100)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0), 0x10) 22:38:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 678.591917] XFS (loop1): Invalid superblock magic number 22:38:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) dup2(r0, 0xffffffffffffffff) 22:38:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x15403}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465672f6c6f6f703000e2255c0d6ce6b5bac247a52dbfb455e2c220b86ddc0389dd5bd45e233d5c118f245bc39e0315ab6a04c6f7adaea02f5a177eaab4ccbf44a6b6bb1b030d00"/86], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:17 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x200, 0x5, &(0x7f0000000140)=[{&(0x7f00000002c0)="823501df5b4cad6b84ad84c0b996d38d5d3fe454862c1a30bdf7fc17bdcf3436d97d04674864c971cfad00071e37a448f7e811a839d8784758e029e83ed7e16c34b415eb98901062149ceb1e91cd50b8cc33b9897bfbec79523a2543bee50a7200c2437af901f905000879ac4da84a26e80428ff272f716a79c80a7d656751f7941b3cba1805e511332b88e47ead1a47ea542053a81d44020c302c5b3476c74022c69554e54f0b2c102ad8508c338da1b7f2cd560c730ef9212fe212334b8e12c5a12522cdd3dcc87d", 0xc9, 0xff}, {&(0x7f0000000440)="b4c493af9c7b7e8afa0ca538fcb63b0e6b39bbc540a036d04f3dda92a547f580caf601d7476e39b694fa5ac93edac12ae76edee1d569ba86d5025f62c5829be069f6084267ae372840e93d7114bd06259e3b3c43c9982edbc569e241585b2cb498acd93c5775b6f51093010fe74835216d4598e1a7cda04b412773fe0b7d0cc7334ad80534f1b2d21f28f2bce69c0779bf2c446989ff662ffc5d9e3267620e8592ba6b8e505676e8a89b70b48a950fb2d61ee515fa98e18e82563e2ff07192bc4fd0c399df7b8a4f89fdefb49efb2b28d03cf6578350ad4f98", 0xd9, 0x10000}, {&(0x7f0000000540)="baf9cc064448cb0d588401f6f67c7bfcb418e67d7fcf68c0a47ab9186a8e40c0dada33e86ff0a539b917230f257062d3e93a9fdf3f2c432ed5c04f70847176e02eb12fde68b4ea300e0bfb536889d7454f4cdf988ca17b3dadb3df7a093d9d7329264d5d3d2a317ed21757fefb8bbf96e5bdd9ad4dccac6fdd817742c35700b737b289a82e01a057a3bcef0449ffe9d375ef2e6ec660ddc20b44974450f8df1a1ff3070e5044825c3ad6c78eb20ea78e968570b89e3793d8bfc64943dcebcd45585e9947f66247ba2dd3", 0xca, 0x5}, {&(0x7f0000000100)="34ff1f0377efc7d314fd827e205b0ff75d5d53780b77c02d209c2425a8a8e7", 0x1f, 0x100}, {&(0x7f0000000640)="406c6a2fe4b24c37e3d0d58ad393575d13b65924edff32ccb3ffcd0ebef419b5a2abe9fb1e7ba22c25826046894dce28f6724e33a64859c5c0ec6714f7d423e7d35f0e6445c40af12d3cab106b8877a59d00723619c65c3039dd4008410577649cacb34636dfe3b85e4601c86fb3af883bc5a41c2f5f6a4705efca3356f676328df888d8af5053458239583848d852a8d938b2512f90bc7d7752bf787d3f7be94803e58413f5eaabbd5d67255a5a388c4a1e596e3767befbf45dc1942646e2beff59636f1c04afd0fe33", 0xca, 0xdd20000}], 0x82000, &(0x7f0000000840)={[{@usrjquota={'usrjquota', 0x3d, 'xfs\x00'}}], [{@uid_eq={'uid', 0x3d, r0}}, {@fowner_gt={'fowner>', r2}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) 22:38:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:38:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)={r1, 0x5}) 22:38:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 679.252156] XFS (loop2): Invalid superblock magic number 22:38:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)={r1, 0x5}) 22:38:18 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) dup2(r0, 0xffffffffffffffff) 22:38:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)={r1, 0x5}) [ 679.549976] XFS (loop1): Invalid superblock magic number 22:38:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:38:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 679.931027] XFS (loop4): Invalid superblock magic number 22:38:19 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 680.176985] XFS (loop4): Invalid superblock magic number 22:38:19 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) dup2(r0, 0xffffffffffffffff) 22:38:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:19 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 680.383462] XFS (loop2): Invalid superblock magic number [ 680.407481] XFS (loop1): Invalid superblock magic number 22:38:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x2200) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f00000000c0)={0x0, 0x10}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r8, &(0x7f0000000140)=[{&(0x7f0000000400)="0e916aee5c622dc12f71f6753ac73840f64d009c57990dbd000cba6e59685abe1a0d7662926cb07b3986ddf6bceef8433ad4861ad2baa1258b59712c2a08adbda1bc2e49d382e731f43453b46020dc68f094f75df2254ad4e7028e48b9688e86b26058e2fbf85f4287096197c04f50d24882a3e1c225b69a65bf59913cb114dd335a01c79f3d620aaec4b98338ac8c5d9cb08f1009a80aa37f897b", 0x9b}], 0x1) ioctl$SNDRV_PCM_IOCTL_STATUS32(0xffffffffffffffff, 0x806c4120, &(0x7f0000000380)) bind$nfc_llcp(r8, &(0x7f00000002c0)={0x27, 0x1, 0x1, 0x2, 0x0, 0xed, "c71ba32a402027019d90bccee205a302914902e3b1b17946001eb1b421286381e879ac3f0845991c7c96362c473c3cec1d5e7bc3c5509a382febbb8229f8bd", 0x5}, 0x60) fcntl$getown(r8, 0x9) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, r7}}, 0x24}}, 0x0) [ 680.497291] nla_parse: 37 callbacks suppressed [ 680.497298] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 680.640330] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 680.677533] XFS (loop4): Invalid superblock magic number 22:38:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 680.727138] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 680.736555] XFS (loop2): Invalid superblock magic number 22:38:19 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 680.770390] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 680.822433] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 22:38:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 680.987929] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 681.064535] XFS (loop2): Invalid superblock magic number 22:38:20 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(r0, r1) 22:38:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 681.217247] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 681.267575] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000050700000000100000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 681.396345] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 681.406302] XFS (loop2): Invalid superblock magic number [ 681.414518] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 681.424449] XFS (loop1): Invalid superblock magic number 22:38:20 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(0xffffffffffffffff, r0) 22:38:20 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x189b1180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x1002010, 0x0) syz_read_part_table(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc880}, 0x4008101) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="80000000", @ANYRES16=0x0, @ANYBLOB="02002bbd7000fbdbdf25160000000100008000000000766c616e300000000000800000000000050800010096d19f8d5e20ef", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f626174616476000500030000000000050003000000000005000400000000000c0001800800030001000000"], 0x80}}, 0x40000) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 22:38:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000050700000000100000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000050700000000100000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 681.802269] XFS (loop4): Invalid superblock magic number 22:38:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:20 executing program 2 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) [ 681.861677] PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex 22:38:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000050700000000100000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 681.975188] FAULT_INJECTION: forcing a failure. [ 681.975188] name failslab, interval 1, probability 0, space 0, times 0 [ 682.062311] CPU: 1 PID: 6757 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 682.070153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.079515] Call Trace: [ 682.082113] dump_stack+0x1b2/0x283 [ 682.085747] should_fail.cold+0x10a/0x154 [ 682.089931] should_failslab+0xd6/0x130 [ 682.093909] kmem_cache_alloc_node+0x25f/0x400 [ 682.098500] copy_process.part.0+0x17d5/0x6fa0 [ 682.103097] ? get_pid_task+0xb8/0x130 [ 682.107094] ? proc_fail_nth_write+0x7b/0x180 [ 682.111600] ? proc_tid_io_accounting+0x20/0x20 [ 682.116273] ? __fdget_pos+0xa6/0xc0 [ 682.120057] ? fsnotify+0x897/0x1110 [ 682.123775] ? __vfs_write+0xec/0x630 [ 682.127575] ? proc_tid_io_accounting+0x20/0x20 [ 682.132252] ? __cleanup_sighand+0x40/0x40 [ 682.136498] ? lock_downgrade+0x6e0/0x6e0 [ 682.140686] _do_fork+0x180/0xc80 [ 682.144153] ? fork_idle+0x270/0x270 [ 682.147881] ? fput+0xb/0x140 [ 682.150991] ? SyS_write+0x14d/0x210 [ 682.154712] ? SyS_read+0x210/0x210 [ 682.158354] ? SyS_clock_settime+0x1a0/0x1a0 [ 682.162768] ? do_syscall_64+0x4c/0x640 [ 682.166755] ? sys_vfork+0x20/0x20 [ 682.170303] do_syscall_64+0x1d5/0x640 [ 682.174204] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 682.179426] RIP: 0033:0x45c1f9 [ 682.182619] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 682.190340] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 682.197623] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 682.204910] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 22:38:21 executing program 3 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 682.212193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 682.219472] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c [ 682.382357] FAULT_INJECTION: forcing a failure. [ 682.382357] name failslab, interval 1, probability 0, space 0, times 0 [ 682.396415] CPU: 1 PID: 6775 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 682.404474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.414134] Call Trace: [ 682.416837] dump_stack+0x1b2/0x283 [ 682.420585] should_fail.cold+0x10a/0x154 [ 682.424839] should_failslab+0xd6/0x130 [ 682.428891] __kmalloc_track_caller+0x2bc/0x400 [ 682.433609] ? strndup_user+0x5b/0xf0 [ 682.437493] memdup_user+0x22/0xa0 [ 682.441077] strndup_user+0x5b/0xf0 [ 682.444729] ? copy_mnt_ns+0x8a0/0x8a0 [ 682.448660] SyS_mount+0x39/0x120 [ 682.452150] ? copy_mnt_ns+0x8a0/0x8a0 [ 682.456064] do_syscall_64+0x1d5/0x640 [ 682.459975] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 682.465178] RIP: 0033:0x45c1f9 [ 682.468362] RSP: 002b:00007f3673f5bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 682.476082] RAX: ffffffffffffffda RBX: 000000000001fa40 RCX: 000000000045c1f9 [ 682.483364] RDX: 0000000020000400 RSI: 00000000200001c0 RDI: 0000000020000240 [ 682.490646] RBP: 00007f3673f5bca0 R08: 0000000000000000 R09: 0000000000000000 [ 682.490652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 22:38:21 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(0xffffffffffffffff, r0) 22:38:21 executing program 1 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000050700000000100000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:21 executing program 2 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 22:38:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000000)={0x3}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000001) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x200005, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 22:38:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 682.490657] R13: 00007fffcb7f87ff R14: 00007f3673f5c9c0 R15: 000000000078bf0c [ 682.559852] XFS (loop4): Invalid superblock magic number 22:38:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000050700000000100000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:21 executing program 3: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfc, 0x4, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x108, 0x1, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x8f83, 0x3, &(0x7f0000000440)=[{&(0x7f0000000340)="922811da60d2395cf61e42241cdffed9b0769f0e711dbb7114063195c1ff26a979bcd2e1435a4ad6e8335e93ab26158109c14e9e671c91bbd5e18607191c18df0d91d7f7d00cdc3ae7c5cc0691515c362e96b259053d0a8e5dcce785fd39344a65d9da202a4f4c6a17dbb287cc2f5c59d6a507acc0dc4adfe0206043ecab435fb25ff5a8fcc20f8e220b7ea1ad3cace381bacf6e32d48f44ed97", 0x9a}, {&(0x7f0000000180)="6879d6", 0x3, 0x5}, {&(0x7f0000000200)="e47c3c4183f3661493e312894ea05681e07181e2eee0592397eaa33949d5a8954def67bf77b588f91504", 0x2a, 0x8}], 0x0, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000000000000000000313ce056a8f7236300020000002552d220cd9574e0c22a330907031606bf1e53c8c1b2692257e336a132"]) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f64ba6a080617a9f13e00"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@NDA_LLADDR={0xa, 0x2, @link_local={0xc}}]}, 0x28}}, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000004c0)={r4, @remote, @remote}, 0xc) [ 682.733665] FAULT_INJECTION: forcing a failure. [ 682.733665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.794468] CPU: 0 PID: 6804 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 682.802303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.811664] Call Trace: [ 682.814265] dump_stack+0x1b2/0x283 [ 682.817907] should_fail.cold+0x10a/0x154 [ 682.822067] __alloc_pages_nodemask+0x22b/0x2730 [ 682.826837] ? retint_kernel+0x2d/0x2d [ 682.830732] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 682.835759] ? trace_hardirqs_on_thunk+0x1a/0x1c 22:38:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000000100005070000000010000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 682.840534] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 682.845458] ? check_preemption_disabled+0x35/0x240 [ 682.850489] ? retint_kernel+0x2d/0x2d [ 682.854392] ? copy_process.part.0+0x17d5/0x6fa0 [ 682.859256] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 682.864724] ? rcu_read_lock_sched_held+0x10a/0x130 [ 682.869749] ? kmem_cache_alloc_node+0x387/0x400 [ 682.874532] copy_process.part.0+0x26a/0x6fa0 22:38:21 executing program 1 (fault-call:8 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:21 executing program 2 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 22:38:22 executing program 2 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) [ 682.874552] ? get_pid_task+0xb8/0x130 [ 682.874565] ? proc_fail_nth_write+0x7b/0x180 [ 682.874576] ? proc_tid_io_accounting+0x20/0x20 [ 682.874589] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.874603] ? fsnotify+0x897/0x1110 [ 682.874612] ? __vfs_write+0xec/0x630 [ 682.874622] ? proc_tid_io_accounting+0x20/0x20 [ 682.874638] ? __cleanup_sighand+0x40/0x40 [ 682.874650] ? lock_downgrade+0x6e0/0x6e0 [ 682.874667] _do_fork+0x180/0xc80 [ 682.874690] ? fork_idle+0x270/0x270 [ 682.874702] ? retint_kernel+0x2d/0x2d [ 682.874718] ? do_syscall_64+0x7a/0x640 [ 682.874727] ? sys_vfork+0x20/0x20 [ 682.874737] do_syscall_64+0x1d5/0x640 [ 682.874751] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 682.874759] RIP: 0033:0x45c1f9 [ 682.874764] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 682.874775] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 682.874780] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 682.874786] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 682.874792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 682.874798] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c [ 682.883441] FAULT_INJECTION: forcing a failure. [ 682.883441] name failslab, interval 1, probability 0, space 0, times 0 [ 682.883489] CPU: 0 PID: 6798 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 682.883497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.883501] Call Trace: [ 682.883518] dump_stack+0x1b2/0x283 [ 682.883538] should_fail.cold+0x10a/0x154 [ 682.883557] should_failslab+0xd6/0x130 [ 682.883568] __kmalloc+0x2c1/0x400 [ 682.883580] ? SyS_memfd_create+0xb9/0x3a0 [ 682.883596] SyS_memfd_create+0xb9/0x3a0 [ 682.883607] ? shmem_fcntl+0x120/0x120 [ 682.883620] ? do_syscall_64+0x4c/0x640 [ 682.883630] ? shmem_fcntl+0x120/0x120 [ 682.883642] do_syscall_64+0x1d5/0x640 [ 682.883660] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 682.883667] RIP: 0033:0x45c1f9 [ 682.883674] RSP: 002b:00007f5a8e7c39f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 682.883693] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c1f9 [ 682.883700] RDX: 0000000020001888 RSI: 0000000000000000 RDI: 00000000004c1315 [ 682.883708] RBP: 00007f5a8e7c3ca0 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 682.883714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 682.883721] R13: 00007ffc4b43645f R14: 00007f5a8e7c49c0 R15: 000000000078bf0c [ 682.951951] XFS (loop1): Invalid superblock magic number [ 682.988403] XFS (loop4): Invalid superblock magic number [ 683.031789] FAULT_INJECTION: forcing a failure. [ 683.031789] name failslab, interval 1, probability 0, space 0, times 0 [ 683.031802] CPU: 1 PID: 6842 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 683.031808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.031812] Call Trace: [ 683.031830] dump_stack+0x1b2/0x283 [ 683.031847] should_fail.cold+0x10a/0x154 [ 683.031863] should_failslab+0xd6/0x130 [ 683.031875] kmem_cache_alloc+0x28e/0x3c0 [ 683.031889] prepare_creds+0x37/0x380 [ 683.031901] copy_creds+0x72/0x4d0 [ 683.031916] copy_process.part.0+0x868/0x6fa0 [ 683.031934] ? get_pid_task+0xb8/0x130 [ 683.031947] ? proc_fail_nth_write+0x7b/0x180 [ 683.031960] ? proc_tid_io_accounting+0x20/0x20 [ 683.031970] ? __fdget_pos+0xa6/0xc0 [ 683.031982] ? __vfs_write+0xec/0x630 [ 683.031992] ? proc_tid_io_accounting+0x20/0x20 [ 683.032012] ? __cleanup_sighand+0x40/0x40 [ 683.032025] ? lock_downgrade+0x6e0/0x6e0 [ 683.032044] _do_fork+0x180/0xc80 [ 683.032061] ? fork_idle+0x270/0x270 [ 683.032073] ? fput+0xb/0x140 [ 683.032083] ? SyS_write+0x14d/0x210 [ 683.032094] ? SyS_read+0x210/0x210 [ 683.032105] ? SyS_clock_settime+0x1a0/0x1a0 [ 683.032117] ? do_syscall_64+0x4c/0x640 [ 683.032134] ? sys_vfork+0x20/0x20 [ 683.032150] do_syscall_64+0x1d5/0x640 [ 683.032171] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 683.032187] RIP: 0033:0x45c1f9 [ 683.032194] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 683.032206] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 683.032214] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 683.032221] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 683.032227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 683.032235] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c [ 683.181587] FAULT_INJECTION: forcing a failure. [ 683.181587] name failslab, interval 1, probability 0, space 0, times 0 [ 683.181598] CPU: 0 PID: 6847 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 683.181603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.181607] Call Trace: [ 683.181622] dump_stack+0x1b2/0x283 [ 683.181638] should_fail.cold+0x10a/0x154 [ 683.181652] should_failslab+0xd6/0x130 [ 683.181661] kmem_cache_alloc+0x28e/0x3c0 [ 683.181673] __d_alloc+0x2a/0x9b0 [ 683.181690] ? lock_downgrade+0x6e0/0x6e0 [ 683.181703] __shmem_file_setup.part.0+0xcb/0x3c0 [ 683.181713] ? shmem_rename2+0x6e0/0x6e0 [ 683.181720] ? __alloc_fd+0x1bf/0x490 [ 683.181736] SyS_memfd_create+0x1f6/0x3a0 [ 683.181745] ? shmem_fcntl+0x120/0x120 [ 683.181753] ? SyS_clock_settime+0x1a0/0x1a0 [ 683.181764] ? do_syscall_64+0x4c/0x640 [ 683.181772] ? shmem_fcntl+0x120/0x120 [ 683.181781] do_syscall_64+0x1d5/0x640 [ 683.181797] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 683.181804] RIP: 0033:0x45c1f9 [ 683.181809] RSP: 002b:00007f5a8e7c39f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 683.181818] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c1f9 [ 683.181822] RDX: 0000000020001888 RSI: 0000000000000000 RDI: 00000000004c1315 [ 683.181827] RBP: 00007f5a8e7c3ca0 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 683.181831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 683.181836] R13: 00007ffc4b43645f R14: 00007f5a8e7c49c0 R15: 000000000078bf0c [ 683.219662] FAULT_INJECTION: forcing a failure. [ 683.219662] name failslab, interval 1, probability 0, space 0, times 0 [ 683.219677] CPU: 1 PID: 6849 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 683.219685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.219689] Call Trace: [ 683.219709] dump_stack+0x1b2/0x283 [ 683.219730] should_fail.cold+0x10a/0x154 [ 683.219749] should_failslab+0xd6/0x130 [ 683.219763] __kmalloc_track_caller+0x2bc/0x400 [ 683.219838] ? selinux_cred_prepare+0x44/0xa0 [ 683.219856] kmemdup+0x23/0x50 [ 683.219869] selinux_cred_prepare+0x44/0xa0 [ 683.219887] security_prepare_creds+0x76/0xb0 [ 683.219918] prepare_creds+0x2cc/0x380 [ 683.219928] copy_creds+0x72/0x4d0 [ 683.219942] copy_process.part.0+0x868/0x6fa0 [ 683.219960] ? get_pid_task+0xb8/0x130 [ 683.219975] ? proc_fail_nth_write+0x7b/0x180 [ 683.219988] ? proc_tid_io_accounting+0x20/0x20 [ 683.219999] ? __fdget_pos+0xa6/0xc0 [ 683.220015] ? __vfs_write+0xec/0x630 [ 683.220027] ? proc_tid_io_accounting+0x20/0x20 [ 683.220048] ? __cleanup_sighand+0x40/0x40 [ 683.220058] ? lock_downgrade+0x6e0/0x6e0 [ 683.220077] _do_fork+0x180/0xc80 [ 683.220093] ? fork_idle+0x270/0x270 [ 683.220106] ? fput+0xb/0x140 [ 683.220116] ? SyS_write+0x14d/0x210 [ 683.220127] ? SyS_read+0x210/0x210 [ 683.220139] ? do_syscall_64+0x4c/0x640 [ 683.220148] ? sys_vfork+0x20/0x20 [ 683.220162] do_syscall_64+0x1d5/0x640 [ 683.220189] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 683.220198] RIP: 0033:0x45c1f9 [ 683.220205] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 683.220217] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 22:38:23 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(0xffffffffffffffff, r0) 22:38:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000000100005070000000010000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:23 executing program 1 (fault-call:8 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:23 executing program 2 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 22:38:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) lookup_dcookie(0xfffffffffffffffc, &(0x7f0000000440)=""/192, 0xc0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@private0}}, &(0x7f00000000c0)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 683.220224] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 683.220231] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 683.220237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 683.220249] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c [ 684.135193] FAULT_INJECTION: forcing a failure. [ 684.135193] name failslab, interval 1, probability 0, space 0, times 0 22:38:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000000100005070000000010000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 684.206606] FAULT_INJECTION: forcing a failure. [ 684.206606] name failslab, interval 1, probability 0, space 0, times 0 22:38:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 684.247352] CPU: 1 PID: 6864 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 684.255194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.264552] Call Trace: [ 684.267146] dump_stack+0x1b2/0x283 [ 684.270790] should_fail.cold+0x10a/0x154 [ 684.274949] should_failslab+0xd6/0x130 [ 684.278932] kmem_cache_alloc+0x28e/0x3c0 22:38:23 executing program 1 (fault-call:8 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x4e21, 0x7, @mcast1, 0x400003}]}, &(0x7f0000000180)=0x10) r1 = dup3(r0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r2, 0x9, 0x0, 0x0, 0x0, 0xffffffff}, 0x14) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f0000000200)=0x4) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x8, "bf"}, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r3, &(0x7f00000002c0), 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000000000808ce9178ee862400000000000000000000000000000000000000000000000033000000", @ANYRESHEX, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000dd28f7c85bbf9d8a74f5b68f82590f0e97d05889ab071e9a88a2b9d1357e61bcea54103d9210681fa78a5892d614af0a0565ff"]) [ 684.283198] __delayacct_tsk_init+0x1b/0x80 22:38:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 684.283213] copy_process.part.0+0x1a6c/0x6fa0 [ 684.283230] ? get_pid_task+0xb8/0x130 [ 684.283243] ? proc_fail_nth_write+0x7b/0x180 [ 684.283254] ? proc_tid_io_accounting+0x20/0x20 [ 684.283265] ? __fdget_pos+0xa6/0xc0 [ 684.283282] ? __vfs_write+0xec/0x630 [ 684.283298] ? __cleanup_sighand+0x40/0x40 [ 684.283308] ? lock_downgrade+0x6e0/0x6e0 [ 684.283323] _do_fork+0x180/0xc80 [ 684.283337] ? fork_idle+0x270/0x270 [ 684.283348] ? fput+0xb/0x140 [ 684.283357] ? SyS_write+0x14d/0x210 22:38:23 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x2042, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(r0, r1) 22:38:23 executing program 2 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 22:38:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 684.283367] ? SyS_read+0x210/0x210 [ 684.283378] ? SyS_clock_settime+0x1a0/0x1a0 [ 684.283389] ? do_syscall_64+0x4c/0x640 [ 684.283403] ? sys_vfork+0x20/0x20 [ 684.283416] do_syscall_64+0x1d5/0x640 [ 684.283434] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 684.283442] RIP: 0033:0x45c1f9 [ 684.283448] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 684.283459] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 684.283465] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 684.283475] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 684.283481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 684.283487] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c [ 684.319965] CPU: 1 PID: 6867 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 684.319972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.319976] Call Trace: [ 684.319993] dump_stack+0x1b2/0x283 [ 684.320008] should_fail.cold+0x10a/0x154 [ 684.320022] should_failslab+0xd6/0x130 [ 684.320031] kmem_cache_alloc+0x28e/0x3c0 [ 684.320042] ? shmem_destroy_callback+0xa0/0xa0 [ 684.320051] shmem_alloc_inode+0x18/0x40 [ 684.320058] ? shmem_destroy_callback+0xa0/0xa0 [ 684.320066] alloc_inode+0x5d/0x170 [ 684.320076] new_inode_pseudo+0x14/0xe0 [ 684.320085] new_inode+0x1b/0x40 [ 684.320093] shmem_get_inode+0x74/0x780 [ 684.320107] __shmem_file_setup.part.0+0x104/0x3c0 [ 684.320117] ? shmem_rename2+0x6e0/0x6e0 [ 684.320123] ? __alloc_fd+0x1bf/0x490 22:38:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 684.320139] SyS_memfd_create+0x1f6/0x3a0 [ 684.320149] ? shmem_fcntl+0x120/0x120 [ 684.320158] ? SyS_clock_settime+0x1a0/0x1a0 [ 684.320168] ? do_syscall_64+0x4c/0x640 [ 684.320176] ? shmem_fcntl+0x120/0x120 [ 684.320194] do_syscall_64+0x1d5/0x640 [ 684.320207] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 684.320226] RIP: 0033:0x45c1f9 [ 684.320231] RSP: 002b:00007f5a8e7c39f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 684.320240] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c1f9 [ 684.320245] RDX: 0000000020001888 RSI: 0000000000000000 RDI: 00000000004c1315 [ 684.320250] RBP: 00007f5a8e7c3ca0 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 684.320255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 684.320260] R13: 00007ffc4b43645f R14: 00007f5a8e7c49c0 R15: 000000000078bf0c [ 684.600992] FAULT_INJECTION: forcing a failure. [ 684.600992] name failslab, interval 1, probability 0, space 0, times 0 [ 684.744506] FAULT_INJECTION: forcing a failure. [ 684.744506] name failslab, interval 1, probability 0, space 0, times 0 [ 684.796822] CPU: 1 PID: 6903 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 684.904341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.904347] Call Trace: [ 684.904367] dump_stack+0x1b2/0x283 [ 684.904386] should_fail.cold+0x10a/0x154 [ 684.904407] should_failslab+0xd6/0x130 [ 684.904421] kmem_cache_alloc+0x28e/0x3c0 [ 684.904438] selinux_inode_alloc_security+0xb1/0x2a0 [ 684.904451] security_inode_alloc+0x8f/0xd0 22:38:23 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 684.904463] inode_init_always+0x576/0xb10 [ 684.904474] alloc_inode+0x7a/0x170 [ 684.904483] new_inode_pseudo+0x14/0xe0 [ 684.904492] new_inode+0x1b/0x40 [ 684.904502] shmem_get_inode+0x74/0x780 [ 684.904514] __shmem_file_setup.part.0+0x104/0x3c0 [ 684.904523] ? shmem_rename2+0x6e0/0x6e0 [ 684.904534] ? SyS_memfd_create+0x1cc/0x3a0 [ 684.904543] SyS_memfd_create+0x1f6/0x3a0 [ 684.904551] ? shmem_fcntl+0x120/0x120 [ 684.904561] ? do_syscall_64+0x7a/0x640 [ 684.904567] ? shmem_fcntl+0x120/0x120 [ 684.904575] do_syscall_64+0x1d5/0x640 [ 684.904589] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 684.904596] RIP: 0033:0x45c1f9 [ 684.904600] RSP: 002b:00007f5a8e7c39f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 684.904608] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c1f9 [ 684.904612] RDX: 0000000020001888 RSI: 0000000000000000 RDI: 00000000004c1315 [ 684.904616] RBP: 00007f5a8e7c3ca0 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 684.904621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 22:38:24 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0), 0x347) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f00000000c0)={0x0, 0x2, 0xfff80000, 0x8, &(0x7f0000000000)=[{0x6, 0x7, 0x3}, {0x0, 0x8, 0x1, 0xcc}, {0x45, 0x7f, 0x800, 0x9}, {0x200, 0x1, 0x3c9c, 0x8}, {0x3, 0xbd, 0x9, 0xa588}, {0x3ff, 0xc4c8, 0x1000, 0x6}, {0xe9, 0x3, 0x5, 0x2}, {0x81, 0x0, 0x9, 0x4000}]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 684.904628] R13: 00007ffc4b43645f R14: 00007f5a8e7c49c0 R15: 000000000078bf0c [ 684.971011] XFS (loop1): Invalid superblock magic number 22:38:24 executing program 1 (fault-call:8 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, 0x0, 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 685.178582] CPU: 1 PID: 6931 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 685.186419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.195874] Call Trace: [ 685.198470] dump_stack+0x1b2/0x283 [ 685.202105] should_fail.cold+0x10a/0x154 [ 685.206273] should_failslab+0xd6/0x130 [ 685.210266] kmem_cache_alloc+0x28e/0x3c0 [ 685.214447] __delayacct_tsk_init+0x1b/0x80 [ 685.218787] copy_process.part.0+0x1a6c/0x6fa0 [ 685.223397] ? get_pid_task+0xb8/0x130 [ 685.223411] ? proc_fail_nth_write+0x7b/0x180 22:38:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) [ 685.223421] ? proc_tid_io_accounting+0x20/0x20 22:38:24 executing program 2 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) [ 685.223443] ? __cleanup_sighand+0x40/0x40 [ 685.223453] ? lock_downgrade+0x6e0/0x6e0 [ 685.223465] ? check_preemption_disabled+0x35/0x240 [ 685.223477] _do_fork+0x180/0xc80 [ 685.223490] ? fork_idle+0x270/0x270 [ 685.223502] ? fput+0xb/0x140 [ 685.223511] ? SyS_write+0x14d/0x210 [ 685.223520] ? SyS_read+0x210/0x210 [ 685.223531] ? SyS_clock_settime+0x1a0/0x1a0 [ 685.223542] ? do_syscall_64+0x4c/0x640 [ 685.223551] ? sys_vfork+0x20/0x20 [ 685.223562] do_syscall_64+0x1d5/0x640 [ 685.223580] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 685.223588] RIP: 0033:0x45c1f9 [ 685.223594] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 685.223604] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 685.223610] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 685.223616] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 685.223622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 685.223628] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c [ 685.355217] FAULT_INJECTION: forcing a failure. [ 685.355217] name failslab, interval 1, probability 0, space 0, times 0 [ 685.355281] CPU: 0 PID: 6966 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 685.355290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.355294] Call Trace: [ 685.355318] dump_stack+0x1b2/0x283 [ 685.355343] should_fail.cold+0x10a/0x154 [ 685.355365] should_failslab+0xd6/0x130 [ 685.355381] kmem_cache_alloc+0x28e/0x3c0 [ 685.355403] get_empty_filp+0x86/0x3e0 [ 685.355421] alloc_file+0x23/0x440 [ 685.355438] ? clear_nlink+0x82/0xb0 [ 685.355459] __shmem_file_setup.part.0+0x198/0x3c0 [ 685.355474] ? shmem_rename2+0x6e0/0x6e0 [ 685.355497] SyS_memfd_create+0x1f6/0x3a0 [ 685.355508] ? shmem_fcntl+0x120/0x120 [ 685.355521] ? do_syscall_64+0x4c/0x640 [ 685.355531] ? shmem_fcntl+0x120/0x120 [ 685.355545] do_syscall_64+0x1d5/0x640 [ 685.355563] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 685.355572] RIP: 0033:0x45c1f9 [ 685.355579] RSP: 002b:00007f5a8e7c39f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 685.355593] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c1f9 [ 685.355600] RDX: 0000000020001888 RSI: 0000000000000000 RDI: 00000000004c1315 [ 685.355608] RBP: 00007f5a8e7c3ca0 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 685.355615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 685.355622] R13: 00007ffc4b43645f R14: 00007f5a8e7c49c0 R15: 000000000078bf0c [ 685.436300] XFS (loop1): Invalid superblock magic number [ 685.437709] XFS (loop4): Invalid superblock magic number [ 685.442789] FAULT_INJECTION: forcing a failure. [ 685.442789] name failslab, interval 1, probability 0, space 0, times 0 [ 685.442836] CPU: 0 PID: 7002 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 685.442844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.442848] Call Trace: [ 685.442868] dump_stack+0x1b2/0x283 [ 685.442887] should_fail.cold+0x10a/0x154 [ 685.442905] should_failslab+0xd6/0x130 [ 685.442922] __kmalloc_track_caller+0x2bc/0x400 [ 685.442935] ? selinux_cred_prepare+0x44/0xa0 [ 685.442946] ? retint_kernel+0x2d/0x2d [ 685.442962] kmemdup+0x23/0x50 [ 685.442975] selinux_cred_prepare+0x44/0xa0 [ 685.442990] security_prepare_creds+0x76/0xb0 [ 685.443006] prepare_creds+0x2cc/0x380 [ 685.443016] copy_creds+0x72/0x4d0 [ 685.443031] copy_process.part.0+0x868/0x6fa0 [ 685.443050] ? lock_downgrade+0x6e0/0x6e0 [ 685.443062] ? check_preemption_disabled+0x35/0x240 [ 685.443073] ? check_preemption_disabled+0x35/0x240 [ 685.443086] ? finish_task_switch+0x178/0x610 [ 685.443112] ? __cleanup_sighand+0x40/0x40 [ 685.443124] ? _raw_spin_unlock_irq+0x5a/0x90 [ 685.443134] ? finish_task_switch+0x178/0x610 [ 685.443145] ? finish_task_switch+0x14d/0x610 [ 685.443161] _do_fork+0x180/0xc80 [ 685.443174] ? fork_idle+0x270/0x270 [ 685.443260] ? firmware_map_remove+0x18f/0x18f [ 685.443273] ? fput+0xb/0x140 [ 685.443290] ? do_syscall_64+0x4c/0x640 [ 685.443301] ? sys_vfork+0x20/0x20 [ 685.443314] do_syscall_64+0x1d5/0x640 [ 685.443332] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 685.443340] RIP: 0033:0x45c1f9 [ 685.443345] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 685.443366] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 685.443372] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 685.443380] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 685.443386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 22:38:24 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x2042, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(r0, r1) 22:38:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:24 executing program 1 (fault-call:8 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}, {0x0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:24 executing program 2 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 22:38:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6462762f6c6f6ff03000"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 685.443392] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c [ 686.014038] nla_parse: 25 callbacks suppressed [ 686.014046] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 686.043264] FAULT_INJECTION: forcing a failure. [ 686.043264] name failslab, interval 1, probability 0, space 0, times 0 [ 686.090092] CPU: 0 PID: 7023 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 686.097963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.107329] Call Trace: [ 686.109932] dump_stack+0x1b2/0x283 [ 686.113574] should_fail.cold+0x10a/0x154 [ 686.117739] should_failslab+0xd6/0x130 [ 686.121730] kmem_cache_alloc_node_trace+0x25a/0x400 [ 686.126846] __kmalloc_node+0x38/0x70 [ 686.130671] kvmalloc_node+0x46/0xd0 [ 686.134392] alloc_fdtable+0xc7/0x270 [ 686.138201] dup_fd+0x683/0xa40 [ 686.141498] copy_process.part.0+0x1b58/0x6fa0 [ 686.146084] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 686.151106] ? retint_kernel+0x2d/0x2d [ 686.154999] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 686.160034] ? __cleanup_sighand+0x40/0x40 [ 686.164283] _do_fork+0x180/0xc80 [ 686.167752] ? fork_idle+0x270/0x270 [ 686.171470] ? retint_kernel+0x2d/0x2d [ 686.175366] ? do_syscall_64+0x7a/0x640 [ 686.179343] ? sys_vfork+0x20/0x20 [ 686.182892] do_syscall_64+0x1d5/0x640 22:38:25 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 686.186797] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 686.191991] RIP: 0033:0x45c1f9 [ 686.195183] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 686.202898] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 686.210173] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 686.217447] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 686.224731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 686.232012] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c 22:38:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r1, &(0x7f00000002c0), 0x347) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0x9f0000, 0x807, 0x200000, r0, 0x0, 0x0}) 22:38:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x7}}]}}]}, 0x3c}}, 0x0) 22:38:25 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 22:38:26 executing program 2 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) [ 687.586151] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 22:38:26 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x280000, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001840)=[{0x0}, {&(0x7f0000001540)="7a5ac32430b94ab069482b5e0cb6e5ce832872f550f42c3f412f8e81bfd69fec30d29903c63b72f6faf7df1e8262315cdd3fe213cca6b0a34caab0035c3888ea5b9eee50ab18b6f1504df14d973a7ca4fc271cbfc8e77cc71d7cfceb48385a3fe4dbca66f6c2a69d2b6fba87ba986180b548d284145901f0285af46244a307cafcaebc4a64102174a4f4d5e65aa606ca48035df278c70ab5918e3adc3290f3cf9cb45441ee299f159b9bfbc0db4793465b5355ed5ada0271e413fcf75e4beabc95b4", 0xc2, 0x3}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 687.746794] FAULT_INJECTION: forcing a failure. [ 687.746794] name failslab, interval 1, probability 0, space 0, times 0 [ 687.785445] CPU: 0 PID: 7070 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 687.793279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.802639] Call Trace: [ 687.805236] dump_stack+0x1b2/0x283 [ 687.808874] should_fail.cold+0x10a/0x154 [ 687.813029] should_failslab+0xd6/0x130 [ 687.817033] kmem_cache_alloc_node_trace+0x25a/0x400 [ 687.822148] __kmalloc_node+0x38/0x70 [ 687.825953] kvmalloc_node+0x46/0xd0 [ 687.829670] alloc_fdtable+0x133/0x270 [ 687.833561] dup_fd+0x683/0xa40 [ 687.836851] copy_process.part.0+0x1b58/0x6fa0 [ 687.841439] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 687.846467] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.851232] ? check_preemption_disabled+0x35/0x240 [ 687.856259] ? retint_kernel+0x2d/0x2d [ 687.860154] ? SyS_write+0x1b7/0x210 [ 687.863882] ? __cleanup_sighand+0x40/0x40 [ 687.868122] ? lock_downgrade+0x6e0/0x6e0 [ 687.872283] _do_fork+0x180/0xc80 [ 687.875751] ? fork_idle+0x270/0x270 [ 687.879468] ? fput+0xb/0x140 [ 687.882577] ? SyS_write+0x14d/0x210 [ 687.886293] ? SyS_read+0x210/0x210 [ 687.889927] ? do_syscall_64+0x4c/0x640 [ 687.893907] ? sys_vfork+0x20/0x20 [ 687.897459] do_syscall_64+0x1d5/0x640 [ 687.901359] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 687.906552] RIP: 0033:0x45c1f9 [ 687.909740] RSP: 002b:00007f92628bdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 687.917460] RAX: ffffffffffffffda RBX: 0000000000001f00 RCX: 000000000045c1f9 [ 687.924736] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000026100900 [ 687.932012] RBP: 00007f92628bdca0 R08: ffffffffffffffff R09: 0000000000000000 [ 687.939293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 687.946571] R13: 00007fff28a7028f R14: 00007f92628be9c0 R15: 000000000078bf0c 22:38:27 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x2042, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) dup2(r0, r1) 22:38:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x35) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001840)=[{0x0}, {0x0}, {0x0}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 690.700426] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 690.707365] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 690.715826] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 690.722705] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 690.730645] device bridge_slave_1 left promiscuous mode [ 690.736102] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.769293] device bridge_slave_0 left promiscuous mode [ 690.774780] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.812293] device veth1_macvtap left promiscuous mode [ 690.817598] device veth0_macvtap left promiscuous mode [ 690.824330] device veth1_vlan left promiscuous mode [ 690.829952] device veth0_vlan left promiscuous mode [ 691.109031] kasan: CONFIG_KASAN_INLINE enabled [ 691.113911] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 691.123058] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 691.129282] Modules linked in: [ 691.132485] CPU: 1 PID: 7603 Comm: kworker/u4:6 Not tainted 4.14.184-syzkaller #0 [ 691.140076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.149428] Workqueue: netns cleanup_net [ 691.153466] task: ffff88805e58a540 task.stack: ffff88805e598000 [ 691.159522] RIP: 0010:__list_del_entry_valid+0x81/0xef [ 691.164809] RSP: 0018:ffff88805e59f938 EFLAGS: 00010246 [ 691.170149] RAX: dffffc0000000000 RBX: ffff88808d1339c0 RCX: 1ffffffff0fe794c [ 691.177396] RDX: 0000000000000000 RSI: ffff88808d1339c0 RDI: ffff88808d133a18 [ 691.184645] RBP: ffff88808d133a10 R08: ffff88805e58a540 R09: dffffc0000000000 [ 691.191894] R10: ffff88805e59fa00 R11: ffff88805e58a540 R12: 0000000000000000 [ 691.199176] R13: 0000000000000000 R14: ffff88808d133a18 R15: ffff8880a9753700 [ 691.206424] FS: 0000000000000000(0000) GS:ffff8880aed00000(0000) knlGS:0000000000000000 [ 691.214627] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 691.220481] CR2: 000000000078c028 CR3: 000000008af23000 CR4: 00000000001406e0 [ 691.227726] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 691.234982] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 691.242227] Call Trace: [ 691.244807] qfq_deactivate_class+0x4c/0xc20 [ 691.249190] qfq_reset_qdisc+0x165/0x2b0 [ 691.253225] ? qfq_deactivate_class+0xc20/0xc20 [ 691.257894] qdisc_destroy+0x104/0x310 [ 691.261758] dev_shutdown+0x27d/0x42d [ 691.265532] rollback_registered_many+0x684/0xa70 [ 691.270350] ? free_netdev+0x360/0x360 [ 691.274212] unregister_netdevice_many.part.0+0x16/0x1d0 [ 691.279649] default_device_exit_batch+0x2dd/0x380 [ 691.284565] ? unregister_netdevice_many+0x50/0x50 [ 691.289524] ? do_wait_intr_irq+0x270/0x270 [ 691.293848] ? cfg80211_switch_netns+0x460/0x460 [ 691.298580] ? unregister_netdevice_many+0x50/0x50 [ 691.303482] ? dev_change_net_namespace+0x9f0/0x9f0 [ 691.308473] ops_exit_list.isra.0+0xef/0x140 [ 691.312871] cleanup_net+0x3bb/0x820 [ 691.316557] ? net_drop_ns+0x70/0x70 [ 691.320248] ? lock_acquire+0x170/0x3f0 [ 691.324197] process_one_work+0x7c0/0x14c0 [ 691.328406] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 691.333061] ? worker_thread+0x163/0x1080 [ 691.337197] ? _raw_spin_unlock_irq+0x24/0x90 [ 691.341682] worker_thread+0x5d7/0x1080 [ 691.345630] ? process_one_work+0x14c0/0x14c0 [ 691.350100] kthread+0x30d/0x420 [ 691.353440] ? kthread_create_on_node+0xd0/0xd0 [ 691.358091] ret_from_fork+0x24/0x30 [ 691.361782] Code: c5 0f 84 df 00 00 00 48 b8 00 02 00 00 00 00 ad de 49 39 c4 0f 84 e0 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 75 51 49 8b 14 24 48 39 ea 0f 85 97 00 00 00 49 8d [ 691.380871] RIP: __list_del_entry_valid+0x81/0xef RSP: ffff88805e59f938 [ 691.391245] ---[ end trace 592dfd220dea8851 ]--- [ 691.396013] Kernel panic - not syncing: Fatal exception [ 691.402503] Kernel Offset: disabled [ 691.406112] Rebooting in 86400 seconds..