85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x18, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 646.345787] XFS (loop3): Invalid superblock magic number 07:42:05 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x13, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xb, 0x9, 0x250, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6"}]}, 0x98}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x18a, 0x7000000) 07:42:05 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x68}) 07:42:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x1a, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d00000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000050f5f52ccf501f9d58b16200000002000000e00000010000000000000000cb1a165338d39a45baa4a76b5eba7de02b3dbf1e5f6d5aa8320430320dfc79c18420c1d826b483ac3d6059703ac0dd62c184"], 0x68}}, 0x0) 07:42:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:05 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 646.585128] XFS (loop3): unknown mount option [h]. 07:42:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x34000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x166, 0x7000000) 07:42:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 646.658917] XFS (loop3): unknown mount option [h]. 07:42:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200200, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000940)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) sendmsg$kcm(r2, &(0x7f0000000180)={&(0x7f0000000340)=@xdp={0x2c, 0x2, r3, 0x36}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="a009fd5a9a7f4931d22343a6d52f22e0e0ef227272934461ed3c310e60dd580180a22aa055a77c35c34a9ca1abe6b0afd27bdc1fcd6d3d9b015688a1f9ca73a663258f3485dad625d9911edb9797d49d5d0ff5a5ae925d0b32c698420203081ada6f471d05c6bd41dca21dd14867b268b4097acfc9e71149c0de1d634fa976322726477e186ed2de99777b543c87fa0cd9d118362c6e99ad77ef564fb8959c8e530eb8397f7319220c9f0fff27fa25cb921a475225ae57e68259e16d72ec2eb193e7ccfa30", 0xc5}, {&(0x7f00000004c0)="9b9a4682aac8fd8ee54b311aa0f70f64433cb1515412544a42b9aafcd9f51d70a37718210882aae41a67cdaff26036e7c54241047fa214815bc6de7d37af4ae5f8ec1bcb8fab28ab73c80179992f55a9bd708e24aa2f452e4d74329d6fb32beba119b94040bcbe1e88476f45ae5b623d5f9ba7cb017275", 0x77}, {0xfffffffffffffffd}, {&(0x7f0000000540)="34c8b087daceec1d18834d0a1cdb1018dc55506601db8d92e4bcc013a304711d829726507f33c1f6e3aa51867fe1d4274969ae920f49fe74a5ef68e42950e8f4d6ddaf8814dbf5709b2243bbeccccdb2ddd2ecb20ad73699b3a9e2a33fdd024a4329e75b3298b12f766d1949ccb468287340507ce491955e0513f0bbc253ddf659f528816bd24fd799413d4e4eeb982efb50f266b5668c9d84e5c1f5e5314700589cd842cc7cd3fd5221eb0febe626fbec93b6dbb86b", 0xb6}, {&(0x7f0000000600)="b484639770a205ed9b4ce44a3b195a9991f7b76fbb680e29f3f6b66ec483d38ad5ee553de31263e6b2c213ee9e0ad6d4685fa6bab1d63af1004ebd55635106ad15dd09193dd93be193cfdb4a1af1c5a8", 0x50}, {&(0x7f0000000680)="9f138209ad4914e4a7acebbb823f49ee141a36aa9725872389458263c1069da103c676e4b1c7f8148cb14222d33cacd228aa8229cfc59e72ddacebaa5b569e3b60066fb6611478b1df9d7dee3b0fc9a7e07c00538db3f7c64428b3ce31884740b23482b1dca1341921cadab4327e87f3b813d16def31822d1f0163ddc6b77ba4c53c23a6dd6a3ee86089359e8010746475966a", 0x93}], 0x6, &(0x7f00000007c0)=[{0x48, 0x18f, 0x7ff, "22cc8b92efaf3e1da31fa66f06b5c37bc86b9175757f167edfc2c7b44582ce3e2ca88c47c8428a9e3bb698c7496b9251b547"}], 0x48, 0x4000800}, 0x4000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x2400}, 0x10) sendto$llc(r2, &(0x7f0000000840)="af2f0f71f1346d85598857f9f770e7eccb9b187a941d8c1e7067bd45045a7e91bab8f72f0cd0c2777b67aaeabcb61593cfdaedcf4593186a2d930735eb153564e698dcb39a2d46f182de915b341998ef30843103fe0d8477ec1dd0976183a9bda37e119c527fcbba96728919e583f094dca9dd1af9a2d2ba978bf29beb442452054803f1b34de3c1bd5f830507d48c3b1bd69dc392761d7609cc2f9ba5f4ad30fa848cf353c356fad1c0c4cb60", 0xad, 0x20004004, &(0x7f0000000900)={0x1a, 0x301, 0x6116, 0x34, 0x100000000000000, 0x7ff, @broadcast}, 0x10) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000000)=0x644) 07:42:06 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x13, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xb, 0x9, 0x250, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6"}]}, 0x98}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x3d4}) 07:42:06 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x400000000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xcc, 0x7000000) 07:42:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000, 0x18f200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\x00', r2}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 646.960647] XFS (loop3): unknown mount option [Ô]. [ 647.019678] XFS (loop3): unknown mount option [Ô]. 07:42:06 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x13, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xb, 0x9, 0x250, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6"}]}, 0x98}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x4000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:06 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3l') 07:42:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x137, 0x7000000) 07:42:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x8030000}) 07:42:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x480000) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000240)=""/192) 07:42:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x400300, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x17, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xf, 0x9, 0x378, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076"}]}, 0xb8}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:06 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x127, 0x7000000) 07:42:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r2 = dup(r0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000001c0)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)=""/4096) ptrace$setregset(0x4205, r1, 0x3, &(0x7f00000000c0)={&(0x7f0000000240)="e39dee3f95f2adef9cec6f56e7e69a08fe7f4c9e98bb9a7471f2d3d0c3540d4d18ff4a20b1c663367505b36bed93f643fe6b873dd5bb772effb99b2c023001a43e24357c9d28939fb1bb0804cd40177e658f0594f90b562eb156b60be1750fa03e61c7d15f6b6afbac6463920efc3ed2f0404435e08a6babdd3196d6fb7b50c56116e2fbf7b947d565fb7a254dd1716f47c29884c1809ff190c5f3bbc469eca19bb9eeed281f0af67e8d02b286fcc52876d62b845242ea8c28e0e8077f", 0xbd}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000001300)=ANY=[@ANYBLOB="020d00000d000000fdffffff0000000008001200001f5d70a7000000000000000600000000000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e013f0765a5405000000010000000000000000000000"], 0x68}}, 0x0) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) 07:42:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x23000000}) 07:42:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x4, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:06 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x17, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xf, 0x9, 0x378, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076"}]}, 0xb8}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:06 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f33ff") [ 647.348957] XFS (loop3): Invalid superblock magic number 07:42:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xd5, 0x7000000) 07:42:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) delete_module(&(0x7f0000000000)='\x00', 0x200) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x40030000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 647.695510] XFS (loop3): Invalid superblock magic number 07:42:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xc400}) 07:42:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x5e, 0x7000000) 07:42:07 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$user(&(0x7f00000008c0)='user\x00', &(0x7f0000000900)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000940)="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", 0x1000, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000840)=[{&(0x7f0000000240)="a0873a3ce4731d25b54ee4a2f7cceea56907e2a3aa4fbd9eabd6b7befa6fee9c710d3fb41574f2971cad6eed93a48cfab801c2293f85be530880f808c688747dcbe0ca5888fb63be12c2bb1dc4c5ffa4ae88863f7a50897e70a7ec491ea31bcf71286c91ff50a9a21c2318806c35700d9019f93597166d4e5891a7dc6bab06dc0e3a138f2292ff771939d3c37ccf8d944646987ee7d756c9f5bc92b497d75f4b5a28420eb53a3adda7e3958f06ff2f8905f4ca08a97c2473fa167baca1e81c94b4e3df865182", 0xc6}, {&(0x7f0000000340)="59e7e0b1241b1e48382557e602ba62c0ef721151ab8a7f41c26d1b12bb711b9b773744e7e618f6bd0e0b12198f5931abe7e7bb31c2b096446b88877b89d9c411f6aba0c1c9b26299714a8f4a328c1c70d500ab052d42f358d4f5759aee4e28", 0x5f}, {&(0x7f00000003c0)="7335286fa8379e0f70b5b9b316cd984b978132554703bcce0341bdea4e599d7a045ef43acb34d7c23f682939c586e3222688bf7163084196837d4d41c9c3a68876b4c9804c654724e7e2c4b2bf85181bd1c8429b6c87b666caa6065e30e7dc53287b5c3bcbcfc9ff7d7cc32eb8650662f3cd724d1b96f8cd95430f4e2df47a0fd49e23ff3f3362a75954428dee831f2d9a874a479ce5e33d648c148372222a48aabff82bc3c18483d830b775", 0xac}, {&(0x7f0000000480)="a47403ea9446f9ea580e0d21f43326ef70b7fa649c01d996c7875c120f899ecd01ed6e887cb670927fa4b469ed2d2d8350304f3f17fa33e4d1e15e49005d9de6ec3d53cd251020095a8878750cc38c22b3f776c3e249b3c438121661f3c40f14d06beb636d0231adb7e1e649765b68961c1eab2b076be9a49d4fde878242613ec3cf44cebbdb526e14a7b3854fef146b8519f37665db6beae441d23aebeda07a6483e6a365f25aa4fb395cd45ccf6df306ae76543c536d49dfa54f655a", 0xbd}, {&(0x7f0000000540)="e419b1f0da07ac99228778e082407b212426b8cd17fca31d3748e5cc8dbfd4e1c32d77b9f27068a0f4a7aafee4a9129ca09ad0f857d7b6df19d47bfa63db04ca06b356c5d439fed514a56b302f8e386f802043917eda8d91683fe664eaeaefb8a4088e59aff6291ca47cc296efb66d345c07ed9e1181ab3b9a2921d8dde743a92ff1196bd3ccdd126b226494b65fb685c79e626feb6e494561408b33d8cdb3fe3304a30042240b21e04acd877d8f3c4758b85204592b113cbfd070407b21434f514ee15bc14cd6712b18d8b84b93380cde8599f630544c9cfe5eda3fa2bfc5", 0xdf}, {&(0x7f0000000640)="473569beaf60607e30216310d54cee9aac554b9d906a15b1f30feb2967b98a87e0cc9c3f0f3c4c20633ab3b4042ae4430eebbb0ede6fd98ab1b2a508249d47ace62a30203d3aa0b495279650655d5877f7f80658b78c88d66c5dbe69c22d6d68dc6b64df8d1ca9bfdbd92a4bb857f2820f9291a403fe52906999e994959a634e9391ac15d35b26ac4f3491", 0x8b}, {&(0x7f0000000700)="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", 0xff}, {&(0x7f0000000800)="1caa8d4f320aa30c79dcf366c1272c05fc1ffe02844c7720f7a3f9", 0x1b}], 0x8, r3) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0), 0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="02408b1d5b486a48a6be0d000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e0000000000000000000000000000000000000"], 0x68}}, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001940)='/dev/sequencer\x00', 0x1, 0x0) ioctl$EVIOCGEFFECTS(r4, 0x80044584, &(0x7f0000001980)=""/186) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:42:07 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x17, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xf, 0x9, 0x378, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076"}]}, 0xb8}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x20000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xbf, 0x7000000) [ 648.070594] XFS (loop3): Invalid superblock magic number 07:42:07 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000030000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x68}}, 0x0) 07:42:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfffffff5}) 07:42:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x1a, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x12, 0x9, 0x408, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076321a25e1e3cb247de9ab61a6a1d3073e7f46"}]}, 0xd0}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x64, 0x7000000) 07:42:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x2000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:07 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 648.366465] XFS (loop3): unknown mount option [õ]. 07:42:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 648.429270] XFS (loop3): unknown mount option [õ]. 07:42:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1b0, 0x7000000) 07:42:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x308}) 07:42:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0xffffff7f00000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7f, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020300000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000c10ad94a5ce8c0845eee7af5de38f05028d0ecedcac3ee53ad2363ade5e736741d422651de8ee2c6da9cda36f4b4f049b2966677d51b4f000000"], 0x68}}, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xff, 0x0) 07:42:07 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f3304") [ 648.609559] XFS (loop3): unknown mount option []. 07:42:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 648.653174] XFS (loop3): unknown mount option []. 07:42:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000140)={r3, 0x2}, 0x8) 07:42:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x1000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x5) 07:42:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x26, 0x7000000) 07:42:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x300000000000000}) 07:42:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:08 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000110000000000000000"], 0x68}}, 0x0) 07:42:08 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x17, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xf, 0x9, 0x378, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076"}]}, 0xb8}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:08 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10000, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x7fff, 0x4) ioctl(r0, 0x8910, &(0x7f0000000140)="0a5c75b500005f857150700434af") r1 = socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000001c0)=[{{}, 0x3, 0x1000, 0x7}, {{}, 0x15, 0x2, 0x4}, {{0x77359400}, 0x5, 0x7fffffff, 0x2}, {{r2, r3/1000+30000}, 0x0, 0x8, 0x5}, {{0x0, 0x2710}, 0x1f, 0x401, 0x4}, {{0x0, 0x2710}, 0x0, 0x2, 0x1}], 0x90) fdatasync(r1) r4 = socket$inet(0x2, 0x6, 0xeb) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000280)=0x20) 07:42:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xe6, 0x7000000) 07:42:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x100000000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:08 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffffef) [ 649.100773] XFS (loop3): Invalid superblock magic number 07:42:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x8001000000000000}) 07:42:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x2000000000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xa9, 0x7000000) 07:42:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:08 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x2de, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x5, &(0x7f0000000700)=0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) ioctl$KDDISABIO(r1, 0x4b37) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d000000000000009300000008001200000002000000000000000000060000002b0a110cdee303b45e00000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000"], 0x68}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005804000040010000000000000000000070030000700300007003000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000006319c329d98d69b200000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaa0e0000000000000000000000000000000000000000000000000000ac1414bbac1414aa05000000ffffffffac1414aaac14141fffffffffffffffff00000000000000000000000000000000000000000000000000ffffffffff00000000000000000000000000000000000000000000000000000000000000000000ffffffff00ff0000000000000000000010000040010100028001983f626f6e645f736c6176655f310000000073797a5f74756e00000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000200000000000000000000f0001801000000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000005802000000000000ac1414bb7f000001ff000000ff00000058f55e1696a3000000000000000000000000000000000000ff00ffff000400000000000000000000000000000000000000000000000000000000000000000000ffffc6ff00ff000000000000000000000002000987d40200000507dd626f6e6430000000000000000000000069726c616e300000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000f0001801000000000000000000000000000000000000000000000000000028004d41524b000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x303) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000040)=""/3, &(0x7f00000000c0)=0x3) getsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000740)=""/52, &(0x7f0000000780)=0x34) 07:42:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x500000000000000) [ 649.495639] XFS (loop3): Invalid superblock magic number 07:42:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x18b, 0x7000000) 07:42:09 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x15, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xd, 0x9, 0x2e8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58"}]}, 0xa8}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x200000000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) 07:42:09 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f33fe") 07:42:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xff0f}) 07:42:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2000000) 07:42:09 executing program 0: r0 = socket$inet6(0xa, 0xfffffffffffe, 0x1) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e20, @local}}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x100000000000000, 0x0, 0xc, 0x0, 0x0, 0x25dfdbfc, [@sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e24, 0x1, @empty, 0x6}, @in6={0xa, 0x4e24, 0x4, @ipv4, 0x2}}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}]}, 0x60}}, 0x0) 07:42:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x163, 0x7000000) [ 649.770794] XFS (loop3): unknown mount option []. 07:42:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0xffffff7f, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 649.826866] XFS (loop3): unknown mount option []. 07:42:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x34000) 07:42:09 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/150, 0x96) sendto(r0, &(0x7f0000000080)="268bdf7099404bf9af67f73f583b618e66b4e68f8f2e5288019a1d7f63c964ffc825095b1ba94831ca561485d5f9", 0x2e, 0x80, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x68}}, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x40) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f00000000c0)) 07:42:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x4c}) 07:42:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xda, 0x7000000) [ 650.038014] XFS (loop3): unknown mount option [L]. 07:42:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x2000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 650.090521] XFS (loop3): unknown mount option [L]. 07:42:09 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x13, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xb, 0x9, 0x258, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de617"}]}, 0x98}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffff7f00000000) 07:42:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x1000000) 07:42:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x3f00000000000000}) 07:42:09 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f33f6") 07:42:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xa8, 0x7000000) 07:42:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000240)={0xf0, 0x0, 0x3, [{0x4, 0x3, 0x3, 0xfffffffffffffff7, 'em1'}, {0x6, 0x1, 0x1, 0x1, '['}, {0x0, 0x3ff, 0x0, 0xfffffffffffffffa}, {0x6, 0x1, 0x0, 0x1f}, {0x4, 0x5, 0x4, 0x8, '*\\&*'}, {0x0, 0x9, 0x16, 0x3, 'vmnet0\\&vmnet1proc)\'lo'}, {0x5, 0x0, 0x2, 0x7, '{H'}]}, 0xf0) 07:42:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x34000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x7000000) 07:42:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x500000000000000) 07:42:09 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x400040, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1, 0x1, 0xfffffffffffffffc, 0x6, @random="af569e87859a"}, 0x14) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2000000000000000) [ 650.343676] XFS (loop3): Invalid superblock magic number 07:42:09 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:09 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x13, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xb, 0x9, 0x258, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de617"}]}, 0x98}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x4, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd000000}) 07:42:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb8, 0x7000000) 07:42:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x100000000000000) 07:42:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x80000) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a00)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000b00)=0xe8) fstat(r1, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000cc0)=0xe8) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000dc0)=0x0) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f40)={0x0}, &(0x7f0000000f80)=0xc) r13 = getuid() getgroups(0x5, &(0x7f0000000fc0)=[0xee01, 0xee01, 0xee01, 0xee01, 0xee01]) sendmsg$unix(r2, &(0x7f0000001100)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000240)="9b19f296c6f200b41d1d39685e9b345001f6627cd753e9db536ab8faa90d1a9166ae4dcf0bfe7ec8fd3ca10369e1ec55abc1b94d478c3312522985ed1efad1e65d2970730c4418852bd2c35de16dbe079e36b72e8b900b88b6a020822e9b27cc6aeab5e0562489aa7a1feebd73df2d8aa17430bc7d647466910a92e8fa61987e012c050be2c5b140bbd79515fb4a95c683e107454ff5001fa468dc0f760435c77a7af5421338aa73680913d5ae3ae94782557b90bb9260a4f62ed7b954551f8678a36dceed7c407ebbc77f004bcd694ecb230b670746", 0xd6}, {&(0x7f0000000340)="cceb01e432a09940de7d2967f633f931c1080ae55ea91392860a10b02265778d167ad501d24b731129e7e2c8f58a6c7782ff2792b41a3ff848f52bb5c3a7846ce5f03ff226ad8a0ba0360884b7fda69fcaf8ff355a21c51669ae11d25919b65e3cbb0286b1546655cdbb02e98ee3f9997d90fe91d673cde5f09f4f4705a1c4ff52d4784588dd53a715e2be7da6758e3cdaa26feea0217e3ca89646c2c68ea2cd41945c15ec51038f774c78265eb4ee5937c96a02432442f66ba462216ca8b17a", 0xc0}, {&(0x7f0000000400)="4b5da2de659b26c438e11105513032351e71f7464c81fd7fe876b3fcedae2b242a501ee1607d0c0d75de1aed2a2edac1a866d909d777656e0f3c46712017ae259a56685ce687d0da624838b57417388706b6b37be184d497f7e02f5734e75f016255fb1cf207a6", 0x67}, {&(0x7f0000000480)="415bafb739037b6569a6b10c8047c4a2bdd7532ea99e93e65f6f7bed8a45134164735efcd787781ecf5ce1aa28bba23d9cc5ff43b9164f0d8b1969723341e71c94a72f99200fe92f5e7e85128c5571acbd342d6afabf44d7ad0fe6d886654147babee139bb33137ad8df4a0a92b9126782c8f8f4d54c7c0932882d8a78a144418e8cdf6e45fd3d0242fcc549c4930559710618df24e764d429826b66deb1a73af1d3833d5756d4096441151dc9b254", 0xaf}, {&(0x7f0000000540)="a671b260d0453e6231026153a371202e1cdb6c9e0357dabf55903a8971ea44acf8bd17d42340e5db36dd834734c07d0248b62daa6f301cec3eeecd1fcf6268dc1e5027af8c3c7d2ef5d6c7e8cfa254976148bd0d3b4c9c7d716e976184b953388a86708d589bece24a1fdb6ec30420799ed22ef56bfc342b928754928b837a25404afdbbb919b70f3a5ed38fb1d636ce86074d9e75f9211ea07382e4644d9321beaa6e22e135a370a76df4544bfc1835b72d928d745f16a557dc043c29e8cc26a4d178ad59c005", 0xc7}, {&(0x7f0000000640)="1217710f0e2293f1f40aa69ecf48f2db9c4afb5df8edc89a70ccae916898ca804cae22e9530a84a8deb6bdd7a10f730ab625b748fef12558b59ddeb25d0b56f7db4759c9d2a5a249e1a101f2c47b0ac748241a3214ed6fb038828b555b6a36a20960e825d99ee3c1271a184882db46db40a4b3dc72f7fcbe1d7807120e828865", 0x80}, {&(0x7f0000000040)}, {&(0x7f00000006c0)="0c518545218383caaff356af5f839f41468c6ce75e592dfdfb7e7b0d409fa67e66644819f432a5c45aaf8deaab0a7641914df8c94cd4591bb36361b6dac439ee3c78d204726d9499940ff5cb70e12d6bb5e609b0f3701513254665db93a6a943d9f7aeea884bdc547d28b4b8f609d36b6361cb2673d3ce9193e121187d8d5c2a227c59f1cc281de68ea83cb4550dd50d654c08441832b838bb251d83668f042887e8a95afb0d0feeaa57d6be5ae01e81757f68228d6ae688e8", 0xb9}, {&(0x7f0000000780)="6d7107df2ae08cc817b791a716e9b1edaedb91cb9a78955eaa347bf10582688c66a8bef35cb5ae7584ce5220b3fb360eba592cf27d08a88bee41cbee41248ce7dea5aff6345314f1816b53239f5217074a69a80f2abfb2568a5fe6b4cd1147fa2080b1bb1db22b703e3919838e3507ecf8854b9e3b7e396c59d90edca1ddf6c1ab280dbff7bef768f968c197098082311942a0583f63285e41ef9b8a705bf8c56dc4788eb372f445fd90ee8781bda8ea94e7de33ca4a850786752e2674589678bd1783723e92563722a7ff6119e773ac9cf8b39d752038120a833858446237ee8a8bdc5c15b2ea7d3d395058ab3e0a81d1fab1c3d2f50b", 0xf7}, {&(0x7f0000000880)="7eb75c9fab21ba7315d5ae070cdc81a3103d64ed3699e03a97abb1a28ee5881c9c1128280022fdbdfe25bd8e823cfc797d6dcda1cd63ea5e96878ecc815d07ed661da0ffa959f70d63b19a5bbe666390513ef9f74a4430dd96d54fe9f1f3a4de77aa1b7b9970d01d0f4a580c60b3494edaf07b1635612c356d216c5534b7c599a350259796ef12d1232f60629851b5dcb454b7e182aa9e1d1f097d1536fe7a", 0x9f}], 0xa, &(0x7f0000001000)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r1, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x20, 0x1, 0x1, [r1, r0, r1, r0]}], 0xd0, 0x40}, 0x4) 07:42:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x5000000) 07:42:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x200000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:10 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 650.702790] XFS (loop3): Invalid superblock magic number 07:42:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x19a, 0x7000000) 07:42:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x400000000000000) 07:42:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x121100, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/215, 0xd7}], 0x1, &(0x7f0000000400)=""/113, 0x71, 0x2}, 0x100) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000500)={@local, @multicast1, 0x0}, &(0x7f0000000540)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000780)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@rand_addr, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000bc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000c00)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000001f40)={@broadcast, @remote, 0x0}, &(0x7f0000001f80)=0xc) getpeername(r0, &(0x7f0000002740)=@hci={0x1f, 0x0}, &(0x7f00000027c0)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002d80)={0x11, 0x0, 0x0}, &(0x7f0000002dc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002e00)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e40)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002e80)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002f80)=0xe8) accept4(r0, &(0x7f0000002fc0)=@hci={0x1f, 0x0}, &(0x7f0000003040)=0x80, 0xd78ebf0bec304ee) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000003080)={@multicast1, @remote, 0x0}, &(0x7f00000030c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003100)={0x0, @multicast2, @rand_addr}, &(0x7f0000003140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003180)={0x0, @multicast2}, &(0x7f00000031c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000003300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000003440)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003480)={'ip_vti0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003a00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80001}, 0xc, &(0x7f0000004300)={&(0x7f0000003a40)={0x8a4, r2, 0x2, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffe1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}]}}, {{0x8, 0x1, r5}, {0x1e4, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x238, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x7, 0xfffffffffffffffc, 0xf7c2, 0x8}, {0x10000, 0x20, 0x2cf3, 0x100000000}, {0xba, 0x1, 0x10001, 0xa6}, {0x5, 0x200, 0x0, 0xffffffff}, {0x20, 0x40, 0xc45c, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8b05}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r15}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r20}, {0x19c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r26}}}]}}]}, 0x8a4}, 0x1, 0x0, 0x0, 0x4000081}, 0x4000810) r27 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r27, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x68}}, 0x0) 07:42:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x2000000}) 07:42:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2000) 07:42:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x2000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:10 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f3319") [ 651.122949] XFS (loop3): Invalid superblock magic number 07:42:10 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x13, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xb, 0x9, 0x258, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de617"}]}, 0x98}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xc4, 0x7000000) 07:42:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2) 07:42:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffffef) 07:42:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0xffffff7f, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:10 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd70c}) 07:42:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x417}, 0x4) [ 651.303859] XFS (loop3): unknown mount option [ ]. 07:42:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x41, 0x7000000) [ 651.375614] XFS (loop3): unknown mount option [ ]. 07:42:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x34000) 07:42:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x20000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf) 07:42:10 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3/') 07:42:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) rt_sigsuspend(&(0x7f0000000000)={0x4}, 0x8) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xf00}) 07:42:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x17c, 0x7000000) [ 651.665031] XFS (loop3): Invalid superblock magic number 07:42:11 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x11, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x9, 0x9, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x88}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x5000000) 07:42:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x400000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffffff00000000) 07:42:11 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xd2, 0x7000000) 07:42:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x2010}) [ 651.862418] XFS (loop3): unknown mount option []. 07:42:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x94, 0x7000000) [ 651.901725] XFS (loop3): unknown mount option []. 07:42:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf00000000000000) 07:42:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x100000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xe00}) 07:42:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf00) 07:42:11 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 652.169093] XFS (loop3): Invalid superblock magic number 07:42:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x4}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r2, @in={{0x2, 0x4e22, @rand_addr=0x1}}, 0x6, 0x1ff, 0x7, 0x6bd2, 0xc3}, &(0x7f0000000040)=0x98) 07:42:11 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x2000000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:11 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xe, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x6, 0x9, 0x138, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c5764"}]}, 0x70}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xefffffff00000000) 07:42:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfffffffd}) 07:42:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x40030000000000) 07:42:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x5a, 0x7000000) 07:42:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffff7f00000000) [ 652.455145] XFS (loop3): unknown mount option [ý]. 07:42:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xefffffff) 07:42:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0xffffff7f00000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x110, 0x7000000) 07:42:11 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f33ff") [ 652.536022] XFS (loop3): unknown mount option [ý]. 07:42:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0xf7b) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0xd, 0x400000000000000, 0x0, 0xb, 0x0, 0x4, 0x2, [@sadb_x_sa2={0x2, 0x13, 0x12fe, 0x0, 0x0, 0x70bd26, 0x49418688}, @sadb_key={0x7, 0x9, 0x148, 0x0, "a41a06d603d08877c857c3ee5cc9c2371a31203f960dead0ef9c5ad337558c872e96ee47fba69484ac"}]}, 0x58}}, 0x200) 07:42:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x6c}) 07:42:12 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xe, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x6, 0x9, 0x138, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c5764"}]}, 0x70}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf000000) 07:42:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x500) 07:42:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x4000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x14c, 0x7000000) 07:42:12 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 652.782666] XFS (loop3): unknown mount option [l]. 07:42:12 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) fremovexattr(r0, &(0x7f0000000040)=@random={'user.', 'selfproc]\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 652.841615] XFS (loop3): unknown mount option [l]. 07:42:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffff7f) 07:42:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x400300, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:12 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xe, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x6, 0x9, 0x138, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c5764"}]}, 0x70}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x5) 07:42:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x10f, 0x7000000) 07:42:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x3}) 07:42:12 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2002, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x500) [ 653.112985] XFS (loop3): unknown mount option []. 07:42:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x2, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x200000000000000) [ 653.166622] XFS (loop3): unknown mount option []. 07:42:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1c6, 0x7000000) 07:42:12 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xf, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x7, 0x9, 0x180, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a17668"}]}, 0x78}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 653.209595] Unknown ioctl 21531 07:42:12 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3t') [ 653.261354] Unknown ioctl 21531 07:42:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xc00000000000000}) 07:42:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf00000000000000) 07:42:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2000000) 07:42:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x2, @mcast1, 0x4}}, 0x87e, 0x200, 0x9191, 0x1, 0x6}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0xfffffffffffffff7, 0x1, 0x2, 0x6, 0x7}, &(0x7f0000000140)=0x14) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x40030000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:12 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f3306") 07:42:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xe0, 0x7000000) [ 653.523605] XFS (loop3): Invalid superblock magic number 07:42:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffffff00000000) 07:42:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x400300) 07:42:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x1000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xb765, 0x40040) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x5) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000040)=0x3ff, 0x4) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d00000000000000000000000800160000000200faffffff000000fc2c000000000000000000ab7300000000000800000200000000000007000000000000000000000000000000000000030005000000000002000000e0000001000000000000"], 0xfffffffffffffdb1}}, 0x0) 07:42:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x42534658}) 07:42:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1c0, 0x7000000) 07:42:13 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 653.788433] XFS (loop3): unknown mount option [X]. [ 653.828667] XFS (loop3): unknown mount option [X]. 07:42:13 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xf, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x7, 0x9, 0x180, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a17668"}]}, 0x78}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x2000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xefffffff00000000) 07:42:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x1000000) 07:42:13 executing program 0: r0 = epoll_create1(0x80000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000040)={0x1, 0x7, 0xc0, &(0x7f0000000240)="cdad9451861055c82164fdaa1ba38ae2f587ada2fd476a1445831e6995534bc36e17653de08d9598c0176c240852e875bb14b84771d725876b9b1092a7b27e3d7fba35c75b218aded2e898703c497ae3959b7fb76b24675c514c7c22c39317a822aaa751a7b8fd7da928bd37c3c27fdc69b7b449d68b606843f5be792fd705656407ed615e4cf9a15922eb19efeba1903eb5123248db85e49dc9d8e11e4e2c1c0011600e15df7f01da6ce608b14a512ff841b70b542cd189bbe92d23686b55cf"}) fcntl$setflags(r0, 0x2, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x3, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0xff, 0x80, 0x0, @in6={0xa, 0x4e22, 0x7fff, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 07:42:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x10b, 0x7000000) 07:42:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xe9090000}) 07:42:13 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xa7, 0x7000000) 07:42:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x4000000) 07:42:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x4000000) 07:42:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x400300, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:13 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f00000001c0)) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020d00000d0000000012080000020f0210f6314b00000000000000000006000000000000ffffffff000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000ba7b051b702ea64e4746d7953049d9711c9cf08e59c6c1cf39"], 0x68}}, 0x0) [ 654.208777] XFS (loop3): Invalid superblock magic number 07:42:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xeb, 0x7000000) 07:42:13 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xf, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x7, 0x9, 0x180, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a17668"}]}, 0x78}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x900}) 07:42:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2000000000000000) 07:42:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2000) 07:42:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xffffff7f, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:13 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:13 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x1) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x12a, 0x7000000) 07:42:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x20000000) 07:42:13 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1a8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f5529"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 654.568381] XFS (loop3): Invalid superblock magic number 07:42:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x4, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x4) 07:42:14 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:14 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0xa, 0x4, {0x57, 0x3, 0x9, {0x0, 0x6}, {0x1, 0x3}, @period={0x59, 0x80, 0xffffffff80000000, 0x1, 0x40, {0xfffffffffffeffff, 0x5, 0x8, 0x4000000000000000}, 0x8, &(0x7f0000000000)=[0x6009, 0x7, 0x0, 0x401, 0x9, 0x2, 0x0, 0xf85d]}}, {0x57, 0x1, 0xc0b, {0xfff, 0x3ff}, {0xfd08}, @const={0xffffffff, {0x0, 0x7, 0x6, 0x58}}}}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[{0x3, 0xffffffffffff6fff}, {0xfffffffffffffffe, 0x3071}, {0x0, 0xffffffffffffffd2}, {0x3}, {0x3, 0x6}, {0x4, 0x6}, {0x4, 0x9}], 0x1) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x187, 0x7000000) 07:42:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x60}) 07:42:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf00) 07:42:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x40030000000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 654.833055] XFS (loop3): unknown mount option [`]. 07:42:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x200000000000000) 07:42:14 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 07:42:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xd0, 0x7000000) [ 654.950939] XFS (loop3): unknown mount option [`]. 07:42:14 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1a8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f5529"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x2) 07:42:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfffffdfd}) 07:42:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x20000000) 07:42:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x20000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:14 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x147, 0x7000000) 07:42:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x10000, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl(r0, 0xfffffffffffffffa, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') sync_file_range(r0, 0xa78, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) r3 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x1000) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0x7) shmdt(r3) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)={r4, 0x2, 0x6, [0x4d, 0x400, 0x2df1, 0x9, 0xfffffffffffffffe, 0x40]}, &(0x7f0000000280)=0x14) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) [ 655.226840] XFS (loop3): unknown mount option [ý]. [ 655.287672] XFS (loop3): unknown mount option [ý]. 07:42:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x4) 07:42:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x400300) 07:42:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x68, 0x7000000) 07:42:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x1000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x2}) 07:42:14 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x8, 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000180)) listen(r1, 0x41d) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x28100) accept4$inet(r3, 0x0, &(0x7f00000000c0), 0x800) write$UHID_INPUT(r3, &(0x7f0000000240)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) getpgid(r4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d00000000000000000000000800120000000200000000000000000006000000000000000000000000000000a98232a2388ea21bff0001ac141400000000000000000000030005000000000002000000e00000010000000000da000000"], 0x68}}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000001280)={0x0, 0x9}, &(0x7f00000012c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000001300)={r5, 0x8}, 0x8) 07:42:14 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1a8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f5529"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 655.496091] XFS (loop3): unknown mount option []. 07:42:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf) 07:42:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xa, 0x7000000) [ 655.552785] XFS (loop3): unknown mount option []. 07:42:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xefffffff) 07:42:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x400000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:15 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20400, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x4, 0x7fff, 0x5, 0x3, 0x5, 0x6, 0x1, 0x4, 0x99, 0x7ff, 0x80, 0x10000000}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:15 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3m') 07:42:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xf00000000000000}) [ 655.735755] Unknown ioctl 21508 07:42:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x400000000000000) [ 655.764763] Unknown ioctl 21508 07:42:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x11a, 0x7000000) 07:42:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x6, 0xef88, 0x3, 0x0, 0x0, [{r1, 0x0, 0x40}, {r1, 0x0, 0x4}, {r1, 0x0, 0x3d1}]}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_ident={0x2, 0xa, 0xf5ee, 0x0, 0x684}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x4a}}, 0x0) 07:42:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:15 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:15 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x40000) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x84010, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d00000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000000000000000008001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000ae5a77bdecd24a327d114c904ef01269efa02bc7b4d881431fe771"], 0x68}}, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) [ 655.825394] XFS (loop3): Invalid superblock magic number 07:42:15 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1b8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x100000000000000) 07:42:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xe000000000000}) 07:42:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb, 0x7000000) 07:42:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000240)=""/226) utimensat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:15 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x4000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:15 executing program 0: r0 = socket$inet6(0xa, 0x80000, 0xffffffffffffff80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="020d00000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e0000001000000000000000074212d0c8a177124c4493a5fb93b70583dbca49519fd0ef011304fa6babf670b568a52441e9d0b3b53c889a40969dddf8e2d0b3c6727056bf369892f4962a43de67da54b88c9c4c5f4c53af1c736fc598cffcd57cf7fe0835100283583e0858ed9daa82c23e215a59bfeb587e8aaa9b68e6a8de0bb61e77d9e0b66a792267fee70902ac2c0631d7a5472acd84693bbe37e2b96ac0970c789ad90c4a4c07ad9e0cf7ae0be59326da6eb36b2859ddd825989fbe3840b46bc8f"], 0x68}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmmsg(r1, &(0x7f0000000440)=[{{&(0x7f0000000140)=@ll={0x11, 0x4, r2, 0x1, 0x7, 0x6, @broadcast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="b03b94fac08601667f3018a0563bf463663852b624310c74989a17a6ab4383f717f3ac5afd9b8034bd173a3d592ca1a48730c3b20d660968184372a2c32fdd41b4a295469e0fc9525401b933ff96e760ecba09d36f2a7af960ad64f1c2c3e750976e6d2107f3c04443ccadcc360633077b614ba0162e3c366cda599754330e4e1c8f3c158729b7aa554d8fdaf2c338b08e66096cd70e7b951440c19cb9cc5ae805c1bbc34859ce6cce5e0eea68472d118ad55a36fa2999ac85425723313f3954b8371db3e9da57b12dc914073fafab60fcba8527695efec6f40f49d874ff7560294c140fe8537be60cf096af018b98fbc825", 0xf2}, {&(0x7f0000000340)="bd70425d705c9a9ca01cbfac3239dac2b349c52990d300564cb27963764adf5d475b2ec44af5d68c60f81263fd9502db841f40e13e687f048429536af30e205d135a783709cbb3d98f00e377276e0c1defa39d365dbc8157716d3fc078ec52442c3cb2658b4070150c", 0x69}, {&(0x7f00000003c0)="da9f72b3054146b7d3357bd53a55b33edbb5ea1da9c4424fbe8a5769a2345f60038b75217818a935613e926b7c9167d9c56b43ef3ef8f8dd6b6b86b83abb07377b653dd5670aa9e1801f52b2dddae501764aab8464756c137371", 0x5a}, {&(0x7f0000000040)="3defb5655b76c01d", 0x8}], 0x4, 0x0, 0x0, 0x1}, 0xff}], 0x1, 0x20000000) 07:42:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x40030000000000) [ 656.185583] XFS (loop3): Invalid superblock magic number 07:42:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x6, 0x7000000) 07:42:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x400000, 0x0) bind$llc(r3, &(0x7f0000000280)={0x1a, 0x0, 0x8, 0x8000, 0x0, 0x1000, @remote}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) rt_tgsigqueueinfo(r2, r4, 0x3e, &(0x7f0000000180)={0x12, 0x23, 0x1, 0x400}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000804000002000200000000000000000030000000030300000000000f00000000000000000000000000000000000e0001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:15 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1b8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:15 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3L') 07:42:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xffffff7f00000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_lifetime={0x0, 0x4, 0x1ff, 0x81, 0x4}]}, 0xfffffffffffffff3}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @remote}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r2, 0xff}, &(0x7f0000000240)=0x8) 07:42:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfdfdffff}) 07:42:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xffffff7f) 07:42:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x12d, 0x7000000) 07:42:15 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:15 executing program 6: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="f0b6aa132b1b08c947a5dec58895d6629709f76964349c81f65b718a7700fe47eb78c2d9a389d1e7766375556a806ce80c3d48db084e2d740b007435f0701e476ae4b2", 0x43) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d000010000000000000000000000003a8edfa4f02ed0006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000"], 0x80}}, 0x0) [ 656.483490] XFS (loop3): unknown mount option [ÿ]. 07:42:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:15 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1b8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d000073cdcc300d0000000000000000000000080012000000020000000000000000fb8f6d51ee000600000000000000000000000000000000000000000000000000000a00000001ac1414bb00000000000000000000000003000500000000000000"], 0x68}}, 0x0) [ 656.566535] XFS (loop3): unknown mount option [ÿ]. 07:42:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x1000000}) 07:42:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0xf000000) 07:42:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xd8, 0x7000000) 07:42:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x100000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000640)={0xffffffffffffff01, 0x24b0f4c8, 0x4, 0x4, 0x1, [{0x1, 0x8, 0xb4b, 0x0, 0x0, 0x203}]}) r1 = socket$key(0xf, 0x3, 0x2) r2 = dup2(r0, r1) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000240)={"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"}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d00000000000000000000000800120000000200000000000000000600000000000000000000000000000000000000000000000000000000000001ac1414bb0000000000000000000000000300050000000000020000000001000000000000000000"], 0x68}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000180)={r4, 0x401, 0x1}, 0xfffffffffffffcb8) 07:42:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="0a5c6d1900315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000f6a5000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000008000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)={0x3, [0xfff, 0xfff, 0x100000000]}, &(0x7f00000000c0)=0xa) 07:42:16 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x80000001}, &(0x7f00000000c0)=0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x14000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r3, 0x8, 0x2}, 0x8) 07:42:16 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1c0, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af34"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:16 executing program 5: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x2) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e000000100000000000000000000000000000003df9b6bba94729e3bf90a12"], 0x80}}, 0x0) 07:42:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x198, 0x7000000) [ 656.913915] XFS (loop3): Invalid superblock magic number 07:42:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20201, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x200000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:16 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, r1) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000240)={0xe, 0xa, 0x10001, 0xd12, 0x1000, "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"}, 0x100c) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'osx.', '/dev/vcs\x00'}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001400)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18000004}, 0xc, &(0x7f0000001300)={&(0x7f0000001280)={0x58, r3, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x4801) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) 07:42:16 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') accept$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x14) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'syz_tun\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000840)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000980)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000a80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000d00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000800}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000ac0)={0x1f8, r2, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x1dc, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xa0e}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}]}}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x8080}, 0x800) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000000)={0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x0) 07:42:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfb03}) 07:42:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r0, r0, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:16 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1c0, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af34"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1a8, 0x7000000) 07:42:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000ebffff020000000000000000080000000600000000000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e000000100000000000000006396f7e2d317318010ac636dabe24a5ea05ba65e5a3ce8997806679716"], 0x68}}, 0x0) [ 657.190989] XFS (loop3): unknown mount option []. 07:42:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:16 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101940, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x5) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) listen(r1, 0x1) [ 657.278419] XFS (loop3): unknown mount option []. 07:42:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x10}) 07:42:16 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1000) setsockopt$inet6_buf(r0, 0x29, 0xf2, &(0x7f0000000000)="639a8ae8b18228a961ca7a171e1decf51a65303764d47b2121411a1b102c9f462f2ccde833ed015f011a4ecceaa37597cf3dd37477f49b323ad03dba6e5167032887d19c0dcb3bb8951da2dfd9d1c881136d699d4d", 0x55) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl(r1, 0x1, &(0x7f00000000c0)="e4aaf3e5413265156e4ebf3a2670e8096c43732a38997d6903f0ed76888e59b634") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d00001000000000000000000000000300060010280000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000400000000000000000000000000000001ac1414bb000000000000000000000000030005000000000004000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1, &(0x7f0000000240)="0a5dc807fe3192d409fe8316f424563078c8df54d6411a05946042198a01f3fe6aaae2f2d82167952337b050be24f8ec0a6bda4811dcc38410836f75d3d171ee2a55c3c8519a5d662293a890489f226d0377af0a4aa654746c8b22e3a838d648e8f766a8ab2516f2a57a7ac1813324d3718533c9b9c8d93f0395d78042d4399ccef6cca3809802de2d2f22cc02b8fadb74a394ace6ea7bd6198ecccb13d2b82295fee6a7c1c2e181291215e640b4b476aec411c965711dc7e4919d8cccf6bef99010d6933c49d627d4d1cbbf8813289a219f3962b4bbc118be9de090654fb72bc06fb6ab55f9a770ca8cb44ce040f1e2519e8fd5f92947") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:16 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x8, 0x9, 0x1c0, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af34"}]}, 0x80}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xf4, 0x7000000) [ 657.483257] XFS (loop3): unknown mount option []. 07:42:16 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000), &(0x7f00000000c0)=0x6) getsockname$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 07:42:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x34000, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 657.573440] XFS (loop3): unknown mount option []. 07:42:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000ea2718e157edefb3082f5e5d7cd26f2cbdad3601ebb83d3d365a5cd70d04a7966007d5c1e58fc9ed62bf60159342a28ad5a0068cc8e076f835b580596f4dae1f4e4794f8627b53a19bd051b24149b17446fb8c9d0143e2dd48c23f95e92a21b01328"], 0x80}}, 0x0) 07:42:17 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000002c0)=0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030fafffff00300000000000f0400000000000000000000020000000008000001ac1414bb00000000000000c48f3d590000000094030005000000000002000000e000000100000000"], 0x80}}, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e23, @rand_addr=0x10000000000000}, {0x6}, 0x40, {0x2, 0x4e24, @multicast1}, 'veth0_to_bridge\x00'}) 07:42:17 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xc, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_key={0x9, 0x9, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x60}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x300}) 07:42:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x141, 0x7000000) 07:42:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0a0dfbff0d0001000000000000000000080012000000020000000000000000000600000000000000000000004000000000000000000000000000000000000001ac1414bb000000b70665cae22fd631ae0000000007000000e0f400010000000600000000ce4156077e39dcb3aabb95dcc992e0caf9888ae104e3907584811feb8e8aa01a1370b99ae3de249ea2f2799a9cc0fa9249b8637f8880f1adc53669dc15333f647d803714000046c52b24554a79267eda8ffaddd472253302a71d298a3db761139c112fdc5844d2dc8072c36e9d4079a2827dff"], 0x68}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x1, 0x40, 0x0, 0x7f, 0x0, 0x4}) 07:42:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000180)={{0x3, 0x0, 0x9, 0x3, 0x7fff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000140)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f00000003c0)={0x90, 0xffffffffffffffda, 0x3, {0x6, 0xd4e9, 0x5, 0x6, 0x3f, 0x5, {0x6, 0x4, 0x81, 0x1, 0xffff, 0xffffffffffff763e, 0x3, 0x3f7, 0x8, 0x86, 0x7, r3, r4, 0x1000, 0x101}}}, 0x90) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x6, 0x1ff}) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 07:42:17 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40004007fd, 0x0) r0 = socket$inet6(0xa, 0x8000f, 0x7) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xa1, 0x7000000) 07:42:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000000c0)=0x80000000, 0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x48100, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000180)=0x4, 0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) socket$rds(0x15, 0x5, 0x0) fcntl$dupfd(r1, 0x406, r1) 07:42:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) r2 = memfd_create(&(0x7f0000000000)='bdev)user[md5sumsystem\x00', 0x0) r3 = getpgrp(0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x1, 0x4, 0x7, 0x7fffffff, r3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000140)={0x2, 0x80000001, [{0x8, 0x0, 0x6}, {0xfff, 0x0, 0x8000080000001}]}) [ 657.885935] XFS (loop3): Invalid superblock magic number 07:42:17 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xc, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_key={0x9, 0x9, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x60}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0xa, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x12c, 0x7000000) 07:42:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x3fffffff}) 07:42:17 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket(0x1, 0x80007, 0x7ff) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="8572000000000000000000461032c17e55195d3eb134d3f6ee73aeba39e39331d0dea6b83238c8d09ad235b4db598df0447da4508529248971c5fce5b4ca6c933ada62ce14ed7eeb15ef0220d4") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x28f9, 0x10001) fcntl$getown(r0, 0x9) 07:42:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x82, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x8) ioctl(r0, 0x7, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x20) ioctl(r0, 0x5c2b, &(0x7f0000000240)="0a5c276263715070000000000000000295aae7fa7e16fa181056441fa6cd11f95a786204158b4269b62930f7af8d8859ded675d4f1d6c7127e092c4f72cda964f5a3b1c9ea220000210d0794f2a4f04db598944629bd7e649e5d69958413954762c9925621ef4239deeb84f0723d09ee4f8dce97baf8b6bcad90733590b95430b7bccd2ec47fca47ee3719cc330c1ee602c36e2637da1406ef776f21745b6ad25eefa9cd9100a605f68f0e35fd97b6a55abf3316a3c7fdb1f88bebe940824ea4821a4b838cad4c15a655667814677c564a536fa93b274f0ae7c9d7ac9dd1f1395d7219b595fd8d571528") r1 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x800}, 0x4) 07:42:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = fcntl$dupfd(r1, 0x406, r0) statx(r2, &(0x7f0000000000)='./file0\x00', 0x6000, 0x180, &(0x7f0000000240)) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)={0x6, 0x1}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000000000000000000001ac1414bb0000000000000000000000000300fa000000000002000000e00000010000000000000000"], 0x68}}, 0x0) 07:42:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x3, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 658.288782] XFS (loop3): unknown mount option [ÿ]. 07:42:17 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") read$eventfd(r0, &(0x7f0000000000), 0x8) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000140)={{0x3, 0x2, 0x7fffffff, 0x1, 0x6}, 0x1, 0x3}) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='tunl0\x00') [ 658.332553] XFS (loop3): unknown mount option [ÿ]. 07:42:17 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40040, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x6) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0x148, 0x5, 0x5, 0x1, 0x70bd2b, 0x25dfdbfc, {0xa, 0x0, 0x1}, [@generic="f2ea89e17bbe071796df0bb86e7a18bd985e9ddb1ea6faf8b0a2834b75bef6e3e27bac836e5a2c94917d18321cc6b87f70ef85a2ad5a610607aa9f227c6151321d2e585a7f4678b17494eafe01c7ac1ca64a2c1bfa286d52df25568dcea6bd10a9d0df8c4f1b47af50adf49aba4c9919ce40077cb5aa2016aff6f57211cc9d3b6c950931a7aaac85dd4773982538360f23f9d1605aaa1b4963e0a4330d45317a022803cae738e315b17fa4122fbff5d306", @generic="fe976f081573ea0e5ca2a9ea058dd9d503aab3115d3acbb8274e2d7396b3898ce1dbd99bdb2f9ac10ab1330eaf34c1b46add7b1e35bbc18c190efddb7bf465bd73c8dccfe4d5b28fd70e499745d133612c90c20aae235840604ff512c1025d7407576962af0485afcca24cfae52066fb34927ac98be50964c8688a12a9fc55d1"]}, 0x148}, 0x1, 0x0, 0x0, 0x40}, 0x4805) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="020d0000100000000000000000000000580f06000000000002000000e00000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb00000000000000df4c000000030005000000000002000000e0000001000000000000000000000000000000002c0dc347eda6b444ab021deb4015f79356269614e4100f72eb25dcab5a976da5a31433d2e12887085d5874d3ce923467e17cf2cb1cc51ada24c95125507feff678ce39fa4ec22083e0d3934bab650486dea7a5befadae9b43540ed8cf8f91e860e0000a8b9313dcabdc761ebdcbed77fa569d64f12a661ec4e88aabda102ce5fe49e6ee430632ba286cb344be03973892013927fafa08516770d39b32522e08ab995ac922a96a13631b47b7541839ed034aa5f5797bd9a54ee5d7af34d21c4ec075495bf6fc6dba96602dd671154ff3292926106909e45ec3bd43d86ba6de7cba5779d7656d42a842f0161a5ee990d08"], 0x80}}, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/qat_adf_ctl\x00', 0x101600, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x6002, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x33, &(0x7f0000000540), &(0x7f0000000580)=0x4) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x280280, 0x20) 07:42:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000000000000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xf9, 0x7000000) 07:42:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x7000000000000000}) 07:42:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0xf2) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x2, 0x4, [0x5, 0xff, 0x0, 0x200]}, 0x10) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x5, 0xcb}, 0x10) ioctl$TIOCSTI(r3, 0x5412, 0x3) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="020d00000d0000000000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000000000000000000701ac9414bb000000000000000000000000030005000000000002000000e00000010000000000000000a9d5cab57894df0b4a6e6bc3b4cc9427ec8fa2f894b530f88261da58db932b5ed32aad6c66cb6f2d375dd961e2b81753"], 0x68}}, 0x0) 07:42:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x1c2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x81, 0x2, 0x73b8, 0x3ff, r3}, 0x10) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x1) [ 658.680157] XFS (loop3): Invalid superblock magic number 07:42:18 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xc, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_key={0x9, 0x0, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x60}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:18 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x11d, 0x7000000) 07:42:18 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x1, 0x20, [0x0, 0x6, 0x5, 0x2, 0x8000, 0x9, 0x5, 0x4]}) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0], 0xfffffffffffffe0c}}, 0x1) 07:42:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x1000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10, 0x800) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000000000000030000000030300003600000f0000000000000000000000008000000000000001ac1414bb000000000000000000000000030005000100000002000000e000000100000000000000000000000000000000000000"], 0x80}}, 0x0) 07:42:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x700000000000000}) 07:42:18 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xad, 0x7000000) 07:42:18 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1080000000002, 0x200) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002200200000000000000000030000000030b00000000000f0000000000000000000000000000000000000001abb604edefbb000000000000000000000000030005000000000002000000e000"], 0x80}}, 0x0) 07:42:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000140)="4617b45a09c4ebc03390dd55c4eb94011abaed88d74b638e2b87418f6a67ca5229a0f1a9a1b8039b91e9a9f1fcabef45fc77d79576882cae5d2f4c93d26792bcd2f5dbee71acd2e02a2a82", 0x4b) write$FUSE_ENTRY(r2, &(0x7f0000000240)={0x90, 0x0, 0x2, {0x6, 0x3, 0x0, 0xff, 0x80000000, 0x101, {0x6, 0x2, 0x458, 0x9, 0x1000, 0x8, 0xe507, 0x7, 0x92, 0x826, 0x0, r3, r4, 0xca, 0x4}}}, 0x90) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0xfffffffffffffffe, 0xd, 0x0, 0x0, 0x40000, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_filter={0x5, 0x1a, @in6=@dev={0xfe, 0x80, [], 0xd}, @in6=@mcast1, 0x3, 0x0, 0x10}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x24}}, 0x80) [ 659.274925] XFS (loop3): Invalid superblock magic number 07:42:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f00000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x6c000000}) 07:42:18 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:18 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xc, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_key={0x9, 0x0, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x60}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:18 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x3, 0x7000000) 07:42:18 executing program 6: r0 = socket$inet6(0xa, 0xb, 0x80000000) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000014bb000000000000000000000000030005000000000002000000e00000010000000000000000000000000000000000"], 0x80}}, 0x0) 07:42:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:18 executing program 0: r0 = socket$inet6(0xa, 0x1000003, 0x100000001) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f, @multicast1}}]}, 0x68}}, 0x0) 07:42:19 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1c1, 0x7000000) [ 659.656831] XFS (loop3): Invalid superblock magic number 07:42:19 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x3) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x428000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000140)=0x1) ioctl(r0, 0x0, &(0x7f0000000000)="f794cf6d51da42177659c6b171cfa7cf6be2") ioctl$TCSETA(r1, 0x5406, &(0x7f0000000180)={0x8, 0x8, 0x7, 0x80000001, 0x1, 0x8001, 0x800, 0x4, 0x8, 0x100}) 07:42:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) 07:42:19 executing program 6: r0 = socket$inet6(0xa, 0x7, 0x2) r1 = semget$private(0x0, 0x3, 0x200) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000240)=""/240) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xa}) 07:42:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)={0x3, 0xffffffffffffff9c}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001000000af5d30873fbb59783425d3e00000229000000000000000000030006000000000002000000e00019010000000000000000080012000200020000000000000000030300000000000f00000000006c79315100000000000013000000ba49cb02bd3e663e30576f65413c01ac1414bb00000000000000000003000700000000f095b3ff76f44ab2f45bdd1cbd7bdea89e87c192990340bd3e61af86d12aabe1c0964ac52c23ffffff7fca3b17f21d079004"], 0x80}}, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6f, &(0x7f00000000c0), &(0x7f0000000180)=0x4) 07:42:19 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x19f, 0x7000000) [ 659.948003] XFS (loop3): unknown mount option [ [ 659.948003] ]. 07:42:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sessionid\x00') ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000140)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x6000000000000000}) 07:42:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4, @multicast1}}]}, 0x68}}, 0x0) 07:42:19 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="6200000010ce7806b11a0710b5f11f22e2e25e72df5ff7364ecd73a68b20e082230e8105cb7c91cc7a5d0c81c01b4c07f1737f2505c8bcc6b000e203909d98d3007df0186509e5087e288bbed64946376c69a30770a005b5c115007c9b9a746e607bedee6994"], &(0x7f0000000000)=0x6a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r3, 0x80, 0x30, 0x7e, 0x8673}, &(0x7f00000001c0)=0x18) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') write$binfmt_elf32(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x9a4, 0x1, 0x9bb, 0xffffffff, 0x20, 0x3, 0x3e, 0x9, 0x305, 0x38, 0x200, 0xffffffffffffffff, 0x5, 0x20, 0x2, 0x4, 0x5a9, 0x4}, [{0x7, 0x5, 0xbe, 0x442, 0xffffffff, 0x400, 0x1, 0x3}, {0x0, 0x5, 0x7ff, 0xf13d, 0x9, 0x8001, 0x8, 0xac25}], "e34aa496bf1192348fc01199f44a2b3d12e2211d92e5f85eb529e3db3aeb732353faa08ee17502e82cd8b7a4986311c82e9c829c152eeada8112aec79d220d4cf199b2826e54682b9c5c3875", [[], [], [], [], [], []]}, 0x6c4) 07:42:19 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xda, "cf4c55b33002b27c9a1f26b03706f86ea30465278cca32dba419379aeefd7440ece3ee12a650ab6188b34ec5cb05f3a95a3966ca07eb506c0df5b284470cc96e052816f44ca1dc03b6cdb740d975ac4cb698e081cd805651c08def16a53afacb8360e11a194f52844f3216f4dfe4b01822fa180aac9d95f09002885915e7ede6744d8dd847ba9082897b77d92f972f2f6d91532c31986cb305368e069f1d3c4f4d9ab0cd9be2f7e207ba1fe8a4d25658f2f081ed39a0563e6ce7177ecd8bf58a1e1d60a9c4d5552803a709bd0e2169c3213060b8bec729c52c7e"}, &(0x7f0000000340)=0xe2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000380)={r1, 0x1fe}, &(0x7f00000003c0)=0x8) r2 = socket$inet6(0xa, 0x80b, 0x40) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000000)=""/80) r4 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000140)=0x4) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001000000000000000000004000300060000000000020000a299cd69ac7c50021e296fcb862000e000000100000000000006000800f00002000200000000000000000030000400030300000000000f0000000000000000000000000000000000000001ac1414bb00000000000000000000000003000500000000000200"], 0x80}}, 0x0) 07:42:19 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x162, 0x7000000) 07:42:19 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xc, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_key={0x9, 0x0, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x60}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000080)) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x2, 0x4, 0x2, 0x100000000e, 0x0, 0x0, 0x70bd25, 0x25dfdc00}, 0x10}}, 0x4004000) ioctl(r0, 0x8912, &(0x7f0000000140)="0a63c80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bbf4ffffff0000000000000000030005000000000002000000e000000100000000000000000000"], 0x80}}, 0x0) r3 = fcntl$getown(r2, 0x9) getsockname$unix(r1, &(0x7f0000000500), &(0x7f0000000280)=0x6e) ptrace$setsig(0x4203, r3, 0x0, &(0x7f00000004c0)={0x15, 0x7ff, 0x4, 0x7}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x20001, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r4, &(0x7f0000000040), 0x7ff) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) recvfrom$llc(r1, &(0x7f00000003c0)=""/242, 0xf2, 0x2001, 0x0, 0xfffffffffffffed0) 07:42:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890f, &(0x7f0000000040)="0a7ea65959b3e24210273a8cc564e2") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00000d000000000000f300000000080012000000020000000000000000000600000000000000000000000000000000000000000000530000000000000000000000080000000000000000000000000300050000006d4187790000e00000010000000000000000"], 0x68}}, 0x0) [ 660.231114] XFS (loop3): Invalid superblock magic number 07:42:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xff0f0000}) 07:42:19 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socketpair$inet(0x2, 0x800, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0xb) socket$netlink(0x10, 0x3, 0x8) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d00000d000000000000000000000008001200007fe2dab8000000000000000000000000000000000000000000000001ac1414bb0180d5f40000000000000000030005000000000002000000e00000010400000000200000000700000f00000000000000000000c306b0bd7b3666093312b84786e91cdefb09bee1affd86a610c9571b"], 0x68}}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40, 0x0) 07:42:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x40030000000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:19 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000140)={0x77359400}, 0x10) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:19 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x69, 0x7000000) 07:42:19 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x10000000000) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) write$sndseq(r1, &(0x7f0000000040), 0x0) r2 = socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 07:42:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000008, 0x1000000000) syz_mount_image$reiserfs(&(0x7f0000000240)='reiserfs\x00', &(0x7f0000000400)='./file0\x00', 0x9, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000440)="359fb416a7d1868955eee33f0d6bd3e3dcd45cfd87bb8d18", 0x18, 0x7}, {&(0x7f0000000480), 0x0, 0x2}], 0x2000, &(0x7f0000000500)={[{@usrquota='usrquota'}, {@noacl='noacl'}]}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = dup(r1) r3 = geteuid() setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000340)={0x90, 0x0, 0x8, {0x0, 0x0, 0x3, 0x2, 0x5, 0x3, {0x0, 0x7, 0x9, 0x2, 0x3, 0x3, 0x7fffffff, 0x7, 0x4, 0x5, 0x4, r3, r4, 0x0, 0x80000000}}}, 0x90) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d000053968db461d5ae1000000000000000010002000000000000000100000000000000000800120002000200000000000001040030000000030300000000000f00000000000043482aa7e703dc583508505f8585c938af9a00000000002a423b5687e007e4ef268140ae8f00000000000001ac1414bb000000000000000000000000030005"], 0x80}}, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0xc04c5349, &(0x7f0000000140)={0x3, 0x5, 0x5}) [ 660.504532] XFS (loop3): Invalid superblock magic number 07:42:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x200000000000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xf000000}) 07:42:20 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x800, 0x8) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1c8, 0x7000000) 07:42:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x43) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x7fffffff, 0x200) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000240)={0x8, 0x22, 0x1, r2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000140)) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000d000000000000000000000008001200000002000000000000000000060000000000000000000000009c802b5c87c3c10ecab56f00b1f8ae91000000000000000000000000000000000000a8f5b510c8d017806aef0173000000000000000000000000000074f96a040b01bbdf00"], 0x68}}, 0x0) 07:42:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") fcntl$setpipe(r0, 0x407, 0x81) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 07:42:20 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x4, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_key={0x1}]}, 0x20}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0xd, 0x4, 0xf, 0xf, 0x0, 0x0, 0x1, [@sadb_lifetime={0x4, 0x3, 0x0, 0xbce0, 0x4, 0x1}, @sadb_address={0x3, 0x6, 0x33, 0x0, 0x0, @in={0x2, 0x4e22, @loopback}}, @sadb_sa={0x2, 0x1, 0x4d3, 0x8, 0x1ff, 0x2, 0x4, 0x40000000}, @sadb_x_nat_t_type={0x1, 0x14, 0x3ff}, @sadb_x_sa2={0x2, 0x13, 0x400, 0x0, 0x0, 0x70bd2c}, @sadb_x_nat_t_port={0x0, 0x17, 0x4e22}]}, 0xfffffffffffffdfb}}, 0x0) 07:42:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x100000000000000, @multicast1}}]}, 0x68}}, 0x0) [ 660.871015] XFS (loop3): Invalid superblock magic number 07:42:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x194, 0x7000000) 07:42:20 executing program 6: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f00000000c0)=0x5, 0x4) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x4c, 0x2, 0x7, 0x1, 0x6, 0x80000000}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x5000000}) 07:42:20 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x141000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1, &(0x7f0000000180)="00362711aec0e9b4c9d46c182c0a43000000") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {r1, r2/1000+30000}}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x57, 0x8, 0x1f, {0x8, 0x6}, {0x4, 0xfffffffffffffffe}, @period={0x5b, 0xffffffffffffffff, 0x7a, 0x0, 0x4, {0x3, 0x6, 0x4, 0x7fcb}, 0x2, &(0x7f0000000000)=[0x7, 0x800]}}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) 07:42:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x400000000000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x149, 0x7000000) 07:42:20 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x6, {0x5, 0x7, 0x1e8, 0xffffffff, 0x6, 0x9}, 0x1, 0xffffffffffffff85}, 0xe) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 07:42:20 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0xe, 0x1) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = dup2(r0, r0) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000000)={0xe8c000000000, 0x37, 0xae44}) [ 661.241706] XFS (loop3): Invalid superblock magic number 07:42:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x803}) 07:42:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000d0000000000ff00000000000800120000000200000000000000e0ff0500000000000000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e0000001cf471fc33136ccb7"], 0x68}}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20002, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000240)=0x8) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f00000002c0)=""/208) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r3, 0x6, 0x10}, 0xc) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000001c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 661.480854] XFS (loop3): unknown mount option []. [ 661.494025] QAT: Invalid ioctl [ 661.533287] QAT: Invalid ioctl [ 661.539724] XFS (loop3): unknown mount option []. 07:42:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000000c0)=""/43) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000002bbd145400000000030006000000000002000000e000000100000000000000000800489a02000200000000000000000006000000030300000000000f0000000000000000000000000000000000000001ac1414bb0000d1000000000000000000030005000000000002000000e00000010000000000000000"], 0x2d}}, 0x1) fgetxattr(r1, &(0x7f0000000000)=@known='security.ima\x00', &(0x7f0000000240)=""/167, 0xa7) 07:42:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x5, 0x7000000) 07:42:20 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xc00}) 07:42:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) listen(r0, 0x6) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xff0f0000}) 07:42:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000, @multicast1}}]}, 0x68}}, 0x0) 07:42:20 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:21 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r2 = getpgid(0xffffffffffffffff) syz_open_procfs(r2, &(0x7f0000000080)='\x00\x00\x00\x00\x00') 07:42:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x292, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000079902bd40002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x63, 0x7000000) 07:42:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x34000, @multicast1}}]}, 0x68}}, 0x0) [ 661.743652] XFS (loop0): Invalid superblock magic number [ 661.778175] XFS (loop3): Invalid superblock magic number 07:42:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x80000000) ioctl$NBD_DO_IT(r2, 0xab03) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:21 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:21 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)="66642f3306") 07:42:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x500}) 07:42:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x18000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x100, 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2, @multicast1}}]}, 0x68}}, 0x0) 07:42:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x13a, 0x7000000) 07:42:21 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@int=0x40, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x2c, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0x7fff}]}, &(0x7f00000001c0)=0x10) 07:42:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x97, "9125a5512833561c847dc1aa3064007fda32ae75963a940ff075190f977d94f2738f88a4e33123a97e745da68164e6b7271a07418f1502f30638f9dd1d58010c6aeee4ea06c56c38f089bcbc2207575c18c19f224765166cc55834a2365b7f6090b8022684b1bd889ac483103e84c8c1d48a22d00a8c3a3d48de794fd47f0ea9cfb7f991c08a0ab1fc1c65b811abe7e5900c332d259f33"}, &(0x7f0000000000)=0x9f) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2, 0xfffffffffffffff7, 0x32710b95, 0x100000000, 0x5, 0x400}, &(0x7f00000000c0)=0x14) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000ff00120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000400000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:21 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xe, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x6, 0x9, 0x138, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c5764"}]}, 0x70}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) fcntl$getflags(r0, 0x408) [ 662.137158] XFS (loop3): Invalid superblock magic number 07:42:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x7a}) 07:42:21 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x400300, @multicast1}}]}, 0x68}}, 0x0) 07:42:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x9f, "e23484aa77cabf5ada99cb79d6596eebbaf744c3247d3e156037637b8d53055c3494d1f3b86b524a41d7a990fd509e9d1cca9f1538c5e488863fb54e5d5289eb212040636898074223478c3ff87d43dee0ff54a176d065444c09c64fd97a497d3f9a044002c447160ac7423bc6fe5f65bacbe2662e6acb2b1c66352dad1311ba907201f3b5211ac7f64d4b537c65215bccd04eaa2c77529b0f80cc7f24dbb7"}, &(0x7f0000000040)=0xa7) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x0, 0x9, 0x4, 0x4, 0xff}, &(0x7f0000000140)=0x14) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xee, 0x7000000) 07:42:21 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0xe, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x6, 0x9, 0x138, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c5764"}]}, 0x70}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 662.416950] XFS (loop3): unknown mount option [z]. [ 662.508674] XFS (loop3): unknown mount option [z]. 07:42:22 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890e, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x105000) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000140)={0x2, 0x0, [{0xf, 0x8, 0x5, 0x9, 0x0, 0x100000000, 0xe1b0}, {0x80000000, 0xfffffffffffffffc, 0x4, 0xfffffffffffffffe, 0x6, 0x5, 0x2}]}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d000010000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e0000001000000000000000090665fe88a2cb1d5b6340afdd5262d6552eb3448217ba3f82166fd7e2676613714bc59c21a6d168368c65fb6be0360512c87544234c7dba24d2754c2073351f6c277869d4d91ab428adce42d25f394b61a145c2005ebe31e45b596ff8f0f0000000000000000000000"], 0x80}}, 0x0) 07:42:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000000, @multicast1}}]}, 0x68}}, 0x0) 07:42:22 executing program 5: r0 = socket$inet6(0xa, 0xe, 0x0) ioctl(r0, 0x8992, &(0x7f00000000c0)="0a5c460564c5d1132b9270") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb7f0000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:22 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xf9) recvfrom$unix(r0, &(0x7f0000000200)=""/63, 0x3f, 0x2000, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") openat(r1, &(0x7f00000000c0)='./file0\x00', 0x801, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)="f2551783005ac00d8740cc0bd4996f12646706ee43bdd925bf17e88e1755691a428e") ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000140)={0x7, 0x200, 0x80000000, {0x0, 0x1c9c380}, 0x3, 0x1cb}) fcntl$setsig(r2, 0xa, 0x30) 07:42:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x15b, 0x7000000) 07:42:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x7a000000}) 07:42:22 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x11, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x9, 0x9, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x88}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1cc, 0x7000000) 07:42:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000180)={0x9, 0x1, 0x8000, 0x505}) ppoll(&(0x7f0000000000)=[{r0, 0x224}, {r1, 0x40}, {r1}], 0x3, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0)={0x203}, 0x8) 07:42:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) flistxattr(r0, &(0x7f0000000240)=""/129, 0x81) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x20000000, @multicast1}}]}, 0x68}}, 0x0) [ 662.773148] XFS (loop3): Invalid superblock magic number 07:42:22 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x1) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ftruncate(r1, 0x100) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') fcntl$dupfd(r0, 0x0, r2) 07:42:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x20000}) 07:42:22 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x136, 0x7000000) 07:42:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) connect$can_bcm(r0, &(0x7f0000000400)={0x1d, r2}, 0x10) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000000)=""/77) 07:42:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000003, 0x1000000000000) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) fallocate(r0, 0x11, 0xe9cd, 0x800) 07:42:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000002}}]}, 0x68}}, 0x0) 07:42:22 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') [ 663.122829] XFS (loop3): Invalid superblock magic number 07:42:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x21, 0x7000000) 07:42:22 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:22 executing program 6: r0 = socket$inet6(0xa, 0x800000000000001, 0x800002) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x100000001, 0x12101) 07:42:22 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x11, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x9, 0x9, 0x1c8, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448"}]}, 0x88}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x4000}) 07:42:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000008}}]}, 0x68}}, 0x0) 07:42:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x3a, 0x7000000) 07:42:22 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0xffffffffffffffff, 0x3, 0x0, 0x0, 0x3}) ioctl(r2, 0x8912, &(0x7f0000000000)='\n\\p') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) modify_ldt$read(0x0, &(0x7f0000000240)=""/174, 0xae) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e0000001000000000000000008001200020002000000008f2a5e3568c6082600030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000a02000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000005000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f000000000000eeff000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x7) 07:42:22 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xde, 0x7000000) 07:42:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x4]}}]}, 0x68}}, 0x0) 07:42:22 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000140)='fd/3\x00') 07:42:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x1000003fe, 0x0, 0xc, 0x1003, 0x0}, &(0x7f0000000240)=0x1dd) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r2, 0x9}, 0x8) poll(&(0x7f0000000000)=[{r0, 0x21}, {r0, 0xa000}, {r1, 0x2060}, {r0, 0x4004}, {r0, 0x2}], 0x5, 0x10000) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 663.609675] XFS (loop3): Invalid superblock magic number 07:42:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x6, &(0x7f0000000000)="0a5cc807004a5a740700f0") r1 = socket$key(0xf, 0x3, 0x2) r2 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000300)={{0x1, 0x0, 0xfb, 0x40, '\x00', 0x6}, 0x1, 0x1, 0x8, r2, 0x9, 0x200, 'syz0\x00', &(0x7f0000000240)=["29776c616e302b271b237d272100", '}GPLposix_acl_accesscgroupposix_acl_access!\x00', 'md5sumppp1\x00', "757365727573657247504c2a055c7365637572697479252a47504c00", '--cgroupwlan0\x00', '\\md5sum,)wlan1\x00', '.4securityusercpuset+selinux\x00', '\x00', '\x00'], 0x9d, [], [0xe200, 0x8, 0x74e, 0xa30]}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d0000100000000000000700000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f000000000000000000000000000000000096f901ac1414de00000000000000000000000002000000e00000010000000000000000000000000000000074383e96bcb66331d0c9197a9ff323427fb444e870428716f58026267a6742249b33eb5d7592447ece7af9fee4b282a09d57cc4a64ba6d37762e06cdcc0888e68283f1850aef5d9a9bfdf9daec7b03741f7fd51402032b03be7c4c6181a1e76244ed8972015d2148525a035b2150ec84b2966c6cec4f3fc04ac1ead2c350a9a92a6c08bec1f1817877a75afb4f3a82944bb9b6143ac297142a385f75f6f9aacb239b66bc16976e817699e09cf983cb5f7aa010f90ace46ac971d9a5b451b7b5a9dbdd0345ec341b018a87cfcc23c6876606bbdeb580c129984a5e776cabc38b8e7907033d7"], 0x80}}, 0x0) 07:42:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xf6ffffff}) 07:42:23 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x17, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xf, 0x9, 0x378, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076"}]}, 0xb8}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x41, "49deef767f6dca72f09c093302a8930ad293288cfcc3c21d1f97a71a1fa91a1aa06b58d4397981cba94c9ca874719fece305d0981722f0620b500aa578e753833f"}, &(0x7f00000000c0)=0x65) 07:42:23 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x200000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315fb95bee3a0000000051112adae071d6") openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x408000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x101002, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x100000000000000]}}]}, 0x68}}, 0x0) 07:42:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x8a, 0x7000000) 07:42:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x40) write$P9_RVERSION(r2, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x1000000, 0x8, '9P2000.u'}, 0x15) [ 663.890812] XFS (loop3): unknown mount option [ÿ]. [ 663.980786] XFS (loop3): unknown mount option [ÿ]. 07:42:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:23 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x9, 0x0, 0x4, 0xe8f}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000001c0)=r1, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:23 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000ff00000100000000000000000800120002000258145cd347631b83a32058a951a9978e00000000000000000030000000030300000000000f000000000000000000000000000000000000000000000000000000030005000000000002000000"], 0x80}}, 0x0) 07:42:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x2000000000000000}) 07:42:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x102, 0x7000000) 07:42:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x400000000000000]}}]}, 0x68}}, 0x0) 07:42:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000000000000030000000030300000000000f0000000000000000000000ff000000c8000000000000001901ac1414bb000000000000000000000000030005000000000002000000e000000100000000000000000000006ec193"], 0x80}}, 0x0) 07:42:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x82be5ebb765c0011, 0x0) sendto$inet(r3, &(0x7f0000000240)="9e0bfdfa781f9502abdc022c6a3696c97dde9ca46337ebea043d78ec4b99c65c95e0e1d271b4702055e60e9d666401a0c057da20b52cad968907e5bfacf2ad1a16842b891ae0d3caa7718e0f9002b2e40582f751a8bd9a8b1fb3b0aa294607da3c85b6ac9dfa35b3c98e8c7683995d599d5c94cffbde1f7e31567be55e103f0de989fa50dbf570e1f65e18a48161383e20177535f6f28beedff2998e13fa429b380a1eb2addf65bf48d2de1a41e25cf2a76785c85cb5aafd1ad72d", 0xbb, 0x8010, &(0x7f0000000140)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) dup3(r1, r3, 0x80000) 07:42:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) init_module(&(0x7f0000000000)='em0security\\&security\x00', 0x16, &(0x7f0000000040)='\x00') [ 664.349530] XFS (loop3): Invalid superblock magic number 07:42:23 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x17, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0xf, 0x9, 0x378, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076"}]}, 0xb8}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffff7f]}}]}, 0x68}}, 0x0) 07:42:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x4b, 0x7000000) 07:42:23 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="0a916336ce31fcaa850d7481c315e95f85315070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:23 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x54, @tick=0x7ff, 0x8, {0x100000000, 0x8}, 0x1, 0x1, 0x8000}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xff, 0x4000) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000206000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e000000100000000000000000ad6819ae5f7c7df60567b1456c3078f36ac40f386caf2e6a5155b397a50df48dd2077340d1759dce4d55b48650ae4934e8716bc8ebd1f23234fb5"], 0x4f}}, 0x4000000000) ioctl$sock_ifreq(r3, 0x893f, &(0x7f00000000c0)={'yam0\x00', @ifru_hwaddr=@broadcast}) 07:42:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfdffffff}) 07:42:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6d2c0000100000ed0000000000000000030006000000000002000000e00000010000edff000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb00000000000000dd2833b7a83fd9efe31e0d9ba60f720600000000000300050000000000"], 0x80}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)) [ 664.601277] XFS (loop3): unknown mount option [ÿ]. 07:42:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2000000000000000]}}]}, 0x68}}, 0x0) 07:42:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x24, 0x7000000) [ 664.650736] XFS (loop3): unknown mount option [ÿ]. 07:42:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000000800f8ff01000200000000000000000030000000030300000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e0000001000000000000000000000000000000"], 0x80}}, 0x0) 07:42:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d000010000000000000005d564d6d3fd4e9548ce0de0c8c31772900000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:24 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000001c0)="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") getsockname$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x1c) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x168}) [ 664.861501] XFS (loop3): unknown mount option [h]. 07:42:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 664.887090] XFS (loop3): unknown mount option [h]. 07:42:24 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x1a, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x12, 0x9, 0x408, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076321a25e1e3cb247de9ab61a6a1d3073e7f46"}]}, 0xd0}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xe8, 0x7000000) 07:42:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x40, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2100, 0x0) mq_getsetattr(r2, &(0x7f00000000c0)={0x4, 0x7f, 0x9, 0x3, 0x6, 0xe435, 0xfffffffffffffff7, 0x5}, &(0x7f0000000140)) 07:42:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x400300]}}]}, 0x68}}, 0x0) 07:42:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800122002001eacd266c4c5b20200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:24 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0)=0xcd1, 0x4) write$P9_RSTAT(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="4d0000007d010000004600bd1dffffffff18040000000100000000000000007cc69174cd5e9e3a080000f7ffffffffffffff00000000050066642f33000e002f6465762f736e617073686f7400"], 0x4d) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x4}) 07:42:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffff7f00000000]}}]}, 0x68}}, 0x0) 07:42:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000140)=""/238) ioctl(r0, 0x8912, &(0x7f0000000080)="50d5") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="05000000100000000000030006000000000002000000e0000001000000000000000008001200020002000000000000000000300000000303745e0000000f000000020000000000000000000000000000000aac1414bb000000000000000000000000030005000000000002000000e00000010000000000200000d78e800a0387b025b27b9bf5e5a8301c000000000e77c9d3d7e0ed5eb39200003aa49247797019d87940e48849e0b0f13a92fd4e113103b1791475880b6a646c1409057114d9f62899303295acf5c342f1fd30649303a818e5c02a73f6e32ff8a3c9e773ecb32a7efbd2"], 0x80}}, 0x0) 07:42:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xe1, 0x7000000) 07:42:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x40, &(0x7f0000000080)="0000006b8b67e0") r1 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 665.148851] XFS (loop3): unknown mount option []. 07:42:24 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) finit_module(r0, &(0x7f0000000000)='em1em0eth1(\x00', 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$void(r1, 0x5451) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0xed6204031d27145a, @empty, 0x4e21, 0x1, 'wlc\x00', 0x14, 0x3, 0x6}, 0x2c) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 665.279936] XFS (loop3): unknown mount option []. 07:42:24 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x9, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x1, 0x9}]}, 0x48}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x1c, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x14, 0x0, 0x498, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076321a25e1e3cb247de9ab61a6a1d3073e7f46f2a7c388cb14ad1798cdc13c1220ceb4a7ed"}]}, 0xe0}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xc2, 0x7000000) 07:42:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x48}) 07:42:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2000000]}}]}, 0x68}}, 0x0) 07:42:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb0000000000000000000000000300050000e0000001000000000000000000000000000000"], 0x80}}, 0x0) 07:42:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="029003000d0104e700000000000000fbdbdf25"], 0x10}}, 0x40000000000) 07:42:24 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0x5, 0x8bae00000, 0x7, 0x7b6}, 0x10) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 665.505391] XFS (loop3): unknown mount option [H]. 07:42:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x8001, 0xa, &(0x7f0000000840)=[{&(0x7f0000000080)="040b6d1547487209ad3727cd8873a9bfd2c79cfe2d4e3a9ad926a0f2ca2851bf43b3e8af17b86b997f97026bdfa5accfe98f8e04ba543aa49feb27999d7c4fdbd0b19737e0cf942af8ade8acd422ec5a24efedc28d274ad9b14fdb98bd", 0x5d, 0x21}, {&(0x7f0000000140)="77f9660eda30cdfd2e303482fe4752b600ce36beafcedae24a6a8b34747546660a9f96bccb9e5b36120636c93b8c22c492a134186493b01f41b4a13e2af4d06a197c4deb1cd7d781f4ae938c67d2", 0x4e, 0xf22b}, {&(0x7f00000001c0)="788f5a7dad281c09f4c63c3a9ad6fb8c4ff8efb6b2c44fcc26ca231d21efab41ebdf2fdbfb2085b720b0e2fa0692363a2d4cce19edc630ccaed456d9302241659f7cf27cd1dce5a2631e3734c43cdbcbdf1275d74fff88fa407c28839e0d97425346d635d78b4785afcf103c34bca7f2e8363196b961658f081cb2d0e96c025c54f748f4f82c35b4b7c819b574da3d60372496434d8f27abaa218c01c930c49ee2b6cbb7cf168040df7d3697d8b09a5aa37d1b718279877f352611d8b3be6fd9334a80a3ea65ea", 0xc7, 0x1000}, {&(0x7f00000002c0)="5f3ff6bd47e5135878a0013daaa07766e8f109239315350adc6212eb1b06c7cc7dc6", 0x22, 0x3}, {&(0x7f0000000300)="79791bbf8c9f5ed10b44ab0f5a3ebf8a47603a3984cc6b006c6b954f163be8ac414ae99ed9d35ccdf76eb9fb88d80d7910be452f31991b3704a284211da0a28915d4deb62f2e9b7f28c6f33a58c7219d018844f52c4052baebe4ad04e33c5a22379dd05ff59187d191aa", 0x6a}, {&(0x7f0000000540)="f97b4fb0339dd9dd2c2f20266f25c3b33bf491bc0d4ead655235d5c48e0346ed7c0680047a3c6bd8047bb5abb9baf8c73b1b967ea99a654292ab8b95013058e24959893dda8470aa52cae51e511b19061e28610101599e5766ca893be521fecd297db7586b3fc3c3d9845e3fa08e1f8d306199e39dbcf210d62e9e16793e512689ae12cd8dd18ad8decbb1bb5f0ebb2b3d", 0x91}, {&(0x7f0000000600)="35d293affec4b97854a9e9bcbad09254098cfdc65b0cf649f62f141cce36f735e0e0dcb521da7e690de945d5ecd9929633fbdbbf1b7a42927451f54f724ebc762e96558c371def7431acb63823dd2f0c90995b671af3cd88db7431f5f4b8e2146891d520ed31215e7137a75a82e17fc0475cdebe700e1d92ae1a6bfbf11f7d09b82850a6de8fd5a5ad4286c8f73b9b7c7e40fb05913cd79cc7ac28c16919b85e54d6579a4e", 0xa5, 0x6}, {&(0x7f00000006c0)="4988adda1ae1ab148f42ac8165e86720802dca46e02a562ca300eb294253e509f3ea90d0ed202ceecaed3db09d12e9b9b4bf360bb7d2b093f357563942a53bd644d5e1885423bdc5c12360dd2753dfd76b7087568faee232fb3f8cf2c3165b43ab80cde717b84c1b2e33eacb5107685896", 0x71, 0x399a}, {&(0x7f0000000740)="445e7df53f2d76eef228c6f00e997b80a7b88abc3bd4cb9bbac71011caf7dc547e9057bc1bf01439148f1d20dfa196688ff1395697f5e874b89ff49927a53b2dc315f8fd60f5254daab7a810099a736c4810117ab74fd8ee7a43e5b7cce91fdbd7dd4b051629231f8dda46f14867a5a9846371b5637763626fb998c3262e3e60e1bdd9691324059c0c59b994f5705376005cf5e9f81b1a57f489849466ffd3a5fcb5989bbe590bf7760050c55166b3261ed40ff358a150e305c2e4baf1", 0xbd, 0x81}, {&(0x7f0000000800)="983b876c7d694deb1f9254d823e471a9177334dfb9bef51906aa37b190b95bdb", 0x20, 0x1000}], 0x10000, &(0x7f0000000940)={[{@barrier_flush='barrier=flush'}, {@notail='notail'}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}, {@usrquota='usrquota'}, {@user_xattr='user_xattr'}, {@tails_small='tails=small'}, {@hash_r5='hash=r5'}, {@hash_tea='hash=tea'}, {@hash_tea='hash=tea'}]}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYRES32=r0], 0x4}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x202100, 0x40) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000400)="e1340be7954a0ca83e1be4991aea1278aef3272949f201b5664fa61dee325cd731c733582a062e", 0x27) 07:42:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x34000]}}]}, 0x68}}, 0x0) 07:42:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x92, 0x7000000) [ 665.576169] XFS (loop3): unknown mount option [H]. 07:42:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x103}}, 0x0) 07:42:25 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc896000000856150707c409e4c51ac764b96b1017f38b3dec4169a252ef82428612cb85cee69b8375ad9b1eb173726af7524070a2d93c8df463077c2e25a9daf254892c96bb7fa010701542c95f24ca16d9bcab745bf6a1369f8f4c417dffdb3abd406047ff940673994833840f90dabbf49f15f81") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd4030000}) [ 665.710419] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "hash=r5" 07:42:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2]}}]}, 0x68}}, 0x0) 07:42:25 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x8, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}]}, 0x40}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:25 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x9, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x1, 0x9}]}, 0x48}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x155, 0x7000000) 07:42:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x6) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:25 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x7, 0x80000000) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700599f2a2efa4cdbda315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x40030000000000]}}]}, 0x68}}, 0x0) 07:42:25 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 665.874722] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 665.984823] XFS (loop3): Invalid superblock magic number 07:42:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x200000000000000]}}]}, 0x68}}, 0x0) 07:42:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xc4000000}) 07:42:25 executing program 6: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xdc, 0x7000000) 07:42:25 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="74000000def51dfe0eaf5b38c23a115e655fd44a707693037ce0aac897e18491b3f0d41dd585f26ebb5d9b36e499b7efe14b6595f66cb8466221829facdef207daf8c00cfb0ccb9d6abb028e8ab5a6f31e715400b5011ab8d4bc38f33503cc551c59df37aef9217a3aba17bc07"], &(0x7f0000000200)=0x7c) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f0000000000)={0x3, {0x3, 0x1000, 0x2, 0x7, 0x4, 0x3}}) 07:42:25 executing program 5: r0 = socket$inet6(0xa, 0x8080000, 0x2) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x40) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000040)={0x3, 0x3, 0x700000000, 0x1, 0x5}) fsync(r1) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYRES64=r0], 0x3ff}}, 0x400a040) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r2, 0x2}, {r0, 0x8}, {r0, 0x1000}], 0x3, &(0x7f0000000180)={r3, r4+30000000}, &(0x7f0000000240)={0x1}, 0x8) 07:42:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x35, 0x7000000) 07:42:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x20000000]}}]}, 0x68}}, 0x0) [ 666.337021] XFS (loop3): Invalid superblock magic number 07:42:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x9, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:25 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x8, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}]}, 0x40}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:25 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = gettid() sched_setparam(r1, &(0x7f0000000000)=0x5) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:25 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x21, 0x0, 0x70bd2b, 0x0, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x14, 0x9, 0x498, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076321a25e1e3cb247de9ab61a6a1d3073e7f46f2a7c388cb14ad1798cdc13c1220ceb4a7ed"}, @sadb_x_sec_ctx={0x5, 0x18, 0x3ff, 0x8, 0x19, "8dd5df5fdf7c39edcb2a76bd5b79f52900a907b58588ba02f9"}]}, 0x108}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xe0000}) 07:42:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1ab, 0x7000000) 07:42:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x1000000]}}]}, 0x68}}, 0x0) 07:42:25 executing program 6: r0 = socket$inet6(0xa, 0x80006, 0x101) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000380)={0x800000000000000, 0x3, 0x7, 0xfffffffffffffffa}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000280)={0x7, 0x3, 0x5, 0x1, 'syz0\x00', 0x8}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e0003c757d820000000000000800120002000200000000000000186fd514b74dbf7a00000000000f0000000000000000000000000000e5ffffff0001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYBLOB="3f0000000700f854dfb9244e3037a5dbeabde420e0362887047fbe050d9e975e2a4962393b777c7c70440866a6b73fa3789b6fa9ad01882b0179ec875cd5ad19b6d93ddff9dbb158660773d7b7a1ecfbb6de9d8643b7e8b18d9514f9e2e137579a6a26bb9f4324789471dd98e7997ea56e4ec8fd46692335598a91195a85b8f46a4a506f1335148a92f56d086939ef8d958e9bdb780747e725c8c82d86df727e97477778cc7fe2b6d2f64d4bd6c58a738c1fcff8c3ebf0fc3cb02a0f02e5364e8700e52ad5d7b413523160066eda7be07ecdaadbf5c8017c6f8ab94527c67ea1e308e23063da29bf3b4194a3e8f9268806cdb2"]) recvmsg$kcm(r3, &(0x7f0000001980)={&(0x7f00000002c0)=@in, 0x80, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f00000019c0)=""/57, 0x39}, {&(0x7f0000000440)=""/163, 0xa3}, {&(0x7f0000000500)=""/254, 0xfe}, {&(0x7f0000000600)=""/197, 0xc5}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/64, 0x40}, {&(0x7f0000001740)=""/181, 0xb5}], 0x8, &(0x7f0000001880)=""/199, 0xc7, 0x6}, 0x40) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000400)={0x7, 0x7fffffff, 0x6, 0x0, 0x5}, 0x14) 07:42:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x188, 0x7000000) 07:42:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x4000000]}}]}, 0x68}}, 0x0) 07:42:26 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl(r0, 0x1, &(0x7f0000000140)="007d9f2a16cdce9971028793e544936931146b95f892a223783edfffccaeac70776e791ee0c291a44c8a8c56d4cbdfc74ac98273a8dd155a6edbd8905f80946b37f0d1d3eb45421e5ecf") syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') [ 666.715704] XFS (loop3): Invalid superblock magic number 07:42:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x6000}) 07:42:26 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x68, 0x5, 0x25, 0x0, 0x70bd2b, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e22}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @loopback}}, @sadb_key={0x14, 0x9, 0x498, 0x0, "ad70d35680532cc94b75c551c0cc02b4a5a3fdc026909e88d5e07beed5401acd3781c5770c57640e3a2ef948e1a176689cfc0f552927af3448838a08cc094320f461d1a63d3e1d833de6170cc7b84e59bd85f3747f390ca649ce09fe58e491c5db3ce778cdb88ff5050fa321ebb076321a25e1e3cb247de9ab61a6a1d3073e7f46f2a7c388cb14ad1798cdc13c1220ceb4a7ed"}, @sadb_x_sec_ctx={0x5, 0x18, 0x3ff, 0x8, 0x19, "8dd5df5fdf7c39edcb2a76bd5b79f52900a907b58588ba02f9"}, @sadb_x_sa2={0x2, 0x13, 0xa12d, 0x0, 0x0, 0x70bd29}, @sadb_x_sa2={0x2, 0x13, 0x18, 0x0, 0x0, 0x70bd2c, 0x3503}]}, 0x128}}, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 667.011798] XFS (loop3): Invalid superblock magic number [ 667.082290] XFS (loop3): Invalid superblock magic number 07:42:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x290082, 0x0) socket$inet6(0xa, 0x807, 0x2) recvfrom$llc(r2, &(0x7f0000000140)=""/65, 0x41, 0x21, &(0x7f0000000040)={0x1a, 0x320, 0x0, 0x5, 0xffffffffffffff00, 0x5}, 0x10) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x4200) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_x_sec_ctx={0x5, 0x18, 0x100000000, 0x7ff, 0x1f, "724716c7471a0d0d50f7f0e083eec691aa4de7bcc5306b66350bb52ae1a7ae"}]}, 0x90}}, 0x0) 07:42:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x18d, 0x7000000) 07:42:26 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x2000000008912, &(0x7f00000005c0)="0a5cc80700315f85715070e5d4a0fe97fb373fe2d9d7306ffd5f862b7216743d6a3aaa18dc39304d864e62e64f086aa5123b7db89d9ca80560a5114d377af2973c39741f7ee952df917e09c66340d820c9a43937cec2d2e61da43118a1aad907932c1c6812f4bd905606b76d27f7b725a2db8d0f1ddb42b4c4a2de15e0dad2a2d46b403612621d85498705d679b73cfdd3b5c1dd66515e3d682a5471bad5ebd9a05a48c65a9e88e8318a42d34e83e685f5d7c8bbc47ac8ac6a2c4174eb35efff6fb0d34d3f9e16338b16e2113c09359cd8433fc360016aa4363080395e6771277efeb210738b8bd592e524b0a6f5aec97df14920dd32d2ac43d0d083e072") ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getgroups(0xa, &(0x7f0000000240)=[0xee01, 0xee01, 0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0x0]) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) write$P9_RSTATu(r0, &(0x7f00000003c0)={0x86, 0x7d, 0x1, {{0x0, 0x63, 0x6, 0x5, {0x4e, 0x3, 0x6}, 0x11000000, 0x98, 0x4, 0x9, 0x8, '+vmnet1+', 0x15, '/proc/self/net/pfkey\x00', 0xe, 'vboxnet1md5sum', 0x5, 'fd/3\x00'}, 0xe, '[wlan1GPL}@GPL', r4, r5, r6}}, 0x86) 07:42:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2000]}}]}, 0x68}}, 0x0) 07:42:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xff0f000000000000}) 07:42:26 executing program 0 (fault-call:6 fault-nth:0): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x58465342}) [ 667.291443] FAULT_INJECTION: forcing a failure. [ 667.291443] name failslab, interval 1, probability 0, space 0, times 0 [ 667.303108] CPU: 1 PID: 19935 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 667.311613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.320972] Call Trace: [ 667.323575] dump_stack+0x1c9/0x2b4 [ 667.327228] ? dump_stack_print_info.cold.2+0x52/0x52 [ 667.332431] ? graph_lock+0x170/0x170 [ 667.336259] should_fail.cold.4+0xa/0x11 07:42:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000003, 0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) 07:42:26 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"5aa27f3220e57a2cafa8188b50dd1e7400942131ed9c899df840afe53ff2cd8f5c6fa36162f2e45b78f12be3e3f23a4966490c1f74dac3f10fc81e3f21c98f48ea5eb09ca913f2b2a3799a47fca13498b7632d0ad6ef771d5ee3c938d76e52076da888c3f3769f91fb39350843a8c69ad380d29c8e4aaac12ffcf4d3ae32d6bcb3d33c7d52357376aa20c652f405dba4bb8fa2e94c2b0e0463e616667200178d580f8940e3e575d5b60e4b7958f847eff7ea9148bb0e0b384b31c099bdfcae42f6e5f2803a53e03e1578a3d9005049bcd72cf301f52b0aab5ca02547de91687b7b853824a9aad70c5f4850cfa256695f53933046a7549a84d451e87459e98950b9700001eceb26f3e4a82c4cc1b8711ac643d62128a39eed7f66d216875e36f12c1aee14209a77292f68de688166af86284f9bb62a55abd138cb2611495ed36e2fb370db118b5e2e344c574387a38af8f0dbe333a77ff8c752a210967e3b840e70e8d32b695d1bea33d221347281862e419df60f12555dee9966de4744c16063367b8532429f97e13b2293300c225154a505b3cdfc5bfbd7b683408ff62d3ca9678e76c08d7e43afaf3dedaa928e692a82159fdf479b539ccc6d33ee54e50864cb399e56eb9a24eb131ed49504fd32c0a5146b3c07402a5af55176778fc22eaf0d35695c2c499cc5814779c6a12758c219046e6aaeeb7d269045cd46a76b112dda1b409b72e9c886b9c45058242c36c9eecfa48c17cefd63fd1945058f007bd21b31e70d51a9dcfd54f08e5014396ea97db8ef80fa444a1d1ede315b59cb868cb8fbfbdf87fbd98b4432e025d2d6a93450466928b7021562424ac9581f3e69e49a6f0e041921aba86f6b2e60749cb085a39119c1c7f3fa132be3b860274011e29ee4ff5801f6b0d6e0c449c2397f0ac7ad439bfa0d0591a6aa5a62b5f99c6b3bb256a25ce0ee0d9f5051cb3c312bc6f40c95984daf059ba1937876c418e596d6d20ad99256e62c4ed5027677961a80dbe49dd52ca0955c53e707f182c7dab9e594e191bd727bb6d57abca36a7d6a66ea3fb01fb6873a4e00ab98aeebc6b9b4b0d1a244525023c13334dcbe253eee5b09186c64fbaa7e2214b77a5d0d55d26f2dafe150dfe0f80c12dba1f34556d9bd52fe0e33dc385c55399d7a376ce27db5ea2fb5dc992ad151a9666fadd4b1c32bd91fe941a334217faddc2da6390e5c2762a551485614ddf6fa0b6e968a1091583028719137a7b70f2b0e4282b5bfaa8edd9f91a63a5b3e1d297c0a4c39c7d6c63932399b2aaeadc8e9a107d692210ded3a7a1e1ead866b34c6f2019de95884945c17968949dbd8b5604161e74978b63a36dce0c002aacbf0cf74b4ace8469e13d774c81aebe8b4d5c5b5b449bb38f77eb7576ad017cc377797767b38fda5182f5feb47ae8d196d526d58ba4c9a97ba13ce"}) [ 667.340369] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 667.345491] ? print_usage_bug+0xc0/0xc0 [ 667.349581] ? graph_lock+0x170/0x170 [ 667.353439] ? find_held_lock+0x36/0x1c0 [ 667.357524] ? __lock_is_held+0xb5/0x140 [ 667.361617] ? check_same_owner+0x340/0x340 [ 667.365964] ? rcu_note_context_switch+0x680/0x680 [ 667.370921] __should_failslab+0x124/0x180 [ 667.375180] should_failslab+0x9/0x14 [ 667.378999] kmem_cache_alloc_node+0x256/0x720 [ 667.383612] __alloc_skb+0x119/0x770 [ 667.387345] ? skb_scrub_packet+0x490/0x490 07:42:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x82, 0x7000000) [ 667.391697] ? find_held_lock+0x36/0x1c0 [ 667.395863] __ip6_append_data.isra.47+0x27a4/0x3600 [ 667.400984] ? lock_downgrade+0x8f0/0x8f0 [ 667.405158] ? kasan_check_read+0x11/0x20 [ 667.409367] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 667.414406] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 667.419113] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 667.423455] ? dst_output+0x180/0x180 [ 667.427274] ? print_usage_bug+0xc0/0xc0 [ 667.431365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.436917] ? ip6_setup_cork+0x120b/0x1ac0 [ 667.441264] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 667.446215] ? mark_held_locks+0xc9/0x160 [ 667.450390] ? __local_bh_enable_ip+0x161/0x230 [ 667.455118] ? __local_bh_enable_ip+0x161/0x230 [ 667.456010] XFS (loop3): unknown mount option [B]. [ 667.459805] ? lockdep_hardirqs_on+0x421/0x5c0 [ 667.469370] ? trace_hardirqs_on+0xbd/0x2c0 [ 667.473732] ? lock_release+0x9f0/0x9f0 [ 667.477715] ? lock_sock_nested+0xe7/0x120 [ 667.481962] ip6_append_data+0x1b4/0x2d0 [ 667.486030] ? rawv6_mh_filter_unregister+0xe0/0xe0 07:42:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x52, 0x7000000) [ 667.491060] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 667.496102] rawv6_sendmsg+0x11cb/0x4720 [ 667.500189] ? rawv6_getsockopt+0x140/0x140 [ 667.504530] ? print_usage_bug+0xc0/0xc0 [ 667.508614] ? __lock_acquire+0x7fc/0x5020 [ 667.512873] ? graph_lock+0x170/0x170 [ 667.516684] ? mark_held_locks+0x160/0x160 [ 667.520934] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.526490] ? aa_label_sk_perm+0x45b/0x8d0 [ 667.530825] ? aa_profile_af_perm+0x430/0x430 [ 667.535330] ? find_held_lock+0x36/0x1c0 [ 667.539407] ? lock_downgrade+0x8f0/0x8f0 [ 667.543590] ? aa_af_perm+0x5a0/0x5a0 [ 667.547415] inet_sendmsg+0x1a1/0x690 [ 667.551232] ? rawv6_getsockopt+0x140/0x140 [ 667.555565] ? inet_sendmsg+0x1a1/0x690 [ 667.559556] ? ipip_gro_receive+0x100/0x100 [ 667.563897] ? apparmor_socket_sendmsg+0x29/0x30 [ 667.568670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.574216] ? security_socket_sendmsg+0x94/0xc0 [ 667.578983] ? ipip_gro_receive+0x100/0x100 [ 667.583321] sock_sendmsg+0xd5/0x120 [ 667.587120] ___sys_sendmsg+0x51d/0x930 [ 667.591134] ? copy_msghdr_from_user+0x580/0x580 [ 667.595913] ? lock_downgrade+0x8f0/0x8f0 [ 667.600087] ? __fget_light+0x2f7/0x440 [ 667.604091] ? fget_raw+0x20/0x20 [ 667.607560] ? lock_downgrade+0x8f0/0x8f0 [ 667.611723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 667.617276] ? proc_fail_nth_write+0x9e/0x210 [ 667.621786] ? proc_cwd_link+0x1d0/0x1d0 [ 667.625869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.631421] ? sockfd_lookup_light+0xc5/0x160 [ 667.635929] __sys_sendmmsg+0x240/0x6f0 [ 667.639923] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 667.644252] ? __lock_is_held+0xb5/0x140 [ 667.648340] ? fput+0x130/0x1a0 [ 667.651634] ? do_syscall_64+0x9a/0x820 [ 667.655624] ? do_syscall_64+0x9a/0x820 [ 667.659617] ? lockdep_hardirqs_on+0x421/0x5c0 [ 667.664208] ? trace_hardirqs_on+0xbd/0x2c0 [ 667.668542] ? __ia32_sys_read+0xb0/0xb0 [ 667.672623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.677999] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 667.683123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.688689] __x64_sys_sendmmsg+0x9d/0x100 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x97, 0x7000000) 07:42:27 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x5e, 0x4) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x150, 0x7000000) 07:42:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x7effffff) ioctl(r0, 0x8, &(0x7f0000000080)='\n\\qPp\x00\x00\x00\x00\x00\x00') setsockopt$inet6_buf(r0, 0x29, 0x6f, &(0x7f0000000000), 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x40, 0x10800) write$P9_RMKNOD(r1, &(0x7f0000000140)={0x14, 0x13, 0x1, {0xd1, 0x2, 0x4}}, 0x14) write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x2, 0x65309b45}, 0xb) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @broadcast}, 0x801, 0x2, 0x1, 0x8, 0x9, 0xffffffff, 0x7}, &(0x7f0000000040)=0x20) getsockopt$packet_int(r1, 0x107, 0x13, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 07:42:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x1020}) 07:42:27 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000001900)={0x1, 0x80000000, 0x4, 0x0, 0x0, [{r0}, {r1, 0x0, 0x6}, {r1, 0x0, 0x72ad}, {r1, 0x0, 0x9}]}) sendmsg$nfc_llcp(r0, &(0x7f0000001340)={&(0x7f0000000140)={0x27, 0x0, 0x1, 0x0, 0x3ff, 0x2, "d250b54921ac9f8cde866d1d9a1524efed5affe9469d600c03bd3783315d9651ebe17dcb34013d9ca7bd0ce18f23cfad0edc9d9b2ac9f3537a660057cbfd1b", 0x39}, 0x60, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="2baa6e9d14583204144209936da62d627c10358ffea3073c15a054093f099ad6c82349a14022110da7ad89599a0c598d5ace950c29c214a1957b60db325c099cb6f4b2b1eadece7afc99278764df7ae005bb5ffd388c8d227e40377d15859530c218df272d67d16547b1869f4414db9bd54c13950a84ce44e9d6f62394b426b8b08ad11279df59f7e6419e0140ca2305c76a407eac4937e7d3e829804926d394b28f79ae08a0973d02f7f45e789b9ede79bb85fc3d9c6726607421594daad9012e046d1d6b75487237fd978f14be8a37b6f6bf421462170dd13e91b357ebc8234ec104ed97a5b5f2596a78a09fda1da3b3bee7f944a1092c6db04e7d1ccc", 0xfe}], 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="38000000000000000f0100004f8c000052acf89a4fc2ea13748a76d2e9bf17a769075d66dc705aa6d701c4755d932df42f54a50000000000"], 0x38, 0x800}, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) eventfd2(0x7, 0x80801) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000018c0)={'\x00', @broadcast}) eventfd2(0xfffffffffffff38f, 0x80001) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001380)={"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"}) socketpair(0x4, 0x6, 0x7066527b, &(0x7f0000001780)) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000000200000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb0000000000000000000000000300fbed7aa398a06bfee8c55e0500000002000000e000000100000000000000"], 0x80}}, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x2, 0x9, 0x0, 0x3, 0xc, 0xd, "48312a175c6441306eb710507fc30eff5573067225fdf36b677535db47da9b7f720327538c83c53515cd1c6e690e4d93521227e0b2ae02b7443207fc685e7fd2", "3daf17cb2a59a20c528819a6ab2c8501dd14e18451d06b1c5e77cf9dbbdd413aaa6426320b10687efc6c47b59f0e0b445703c257924aa810981e3be9043dbec9", "822e27a9782ff88f3aaf1b7f4b3cc991c3bfc41e1fcb78880cd0e3839dfb27fc", [0xafc9, 0xc0]}) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000019c0)={0x2, 0xfffffffffffffff7}, 0x2) 07:42:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x400000000000000]}}]}, 0x68}}, 0x0) [ 667.692966] do_syscall_64+0x1b9/0x820 [ 667.696864] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 667.702239] ? syscall_return_slowpath+0x5e0/0x5e0 [ 667.707193] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 667.712239] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 667.717269] ? recalc_sigpending_tsk+0x180/0x180 [ 667.722038] ? kasan_check_write+0x14/0x20 [ 667.726300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 667.731319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.736520] RIP: 0033:0x457099 [ 667.739717] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.758622] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 667.766332] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 667.773618] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 667.780892] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 667.788172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 667.795450] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000000 [ 667.818883] XFS (loop3): unknown mount option [B]. [ 667.870936] XFS (loop1): Invalid superblock magic number 07:42:27 executing program 0 (fault-call:6 fault-nth:1): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:27 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7ff, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000200)="543fc3f105f55f85b48dfca739722d85ca66452516324ade5f241240f3145074268b8b6374610f7ee3e084b4631b9c9397ef2e540b968f11a07ea55c3b07ae65a6044d627f352e19222587380c1b822ca969ca413d81e447d6b09cce7610bc5abc28c2692fcc269ba36b878125cc6fc25be6283bddc8f5a188f6a4df1cb22c15d4295781b1bc74211ce2998ab58afe77833a42be2bfaf365dd1d5edd22f2d830329a1154e2b58da48e7c270ca2bf24f77dc55dae20", 0xb5, 0x1ff}], 0x4000, &(0x7f0000000300)={[{@norecovery='norecovery'}, {@flush_merge='flush_merge'}, {@noquota='noquota'}, {@adaptive_mode='mode=adaptive'}, {@disable_ext_identify='disable_ext_identify'}]}) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x100, 0x4) 07:42:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000003, 0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xa2, 0x7000000) [ 668.029744] XFS (loop3): unknown mount option [ ]. [ 668.104452] XFS (loop3): unknown mount option [ ]. [ 668.133376] F2FS-fs (loop4): Unable to read 1th superblock [ 668.148623] FAULT_INJECTION: forcing a failure. [ 668.148623] name failslab, interval 1, probability 0, space 0, times 0 [ 668.160406] CPU: 0 PID: 20023 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 668.169002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.178370] Call Trace: [ 668.180973] dump_stack+0x1c9/0x2b4 [ 668.184619] ? dump_stack_print_info.cold.2+0x52/0x52 [ 668.189846] should_fail.cold.4+0xa/0x11 [ 668.193937] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 668.199062] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 668.204573] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.209348] ? graph_lock+0x170/0x170 [ 668.213177] ? find_held_lock+0x36/0x1c0 [ 668.217260] ? __lock_is_held+0xb5/0x140 [ 668.221358] ? check_same_owner+0x340/0x340 [ 668.225694] ? mark_held_locks+0xc9/0x160 [ 668.229860] ? rcu_note_context_switch+0x680/0x680 [ 668.234804] ? kmem_cache_alloc_node+0x217/0x720 [ 668.239578] __should_failslab+0x124/0x180 [ 668.243839] should_failslab+0x9/0x14 [ 668.247664] kmem_cache_alloc_node_trace+0x259/0x720 [ 668.248438] F2FS-fs (loop4): Unable to read 2th superblock [ 668.252793] __kmalloc_node_track_caller+0x33/0x70 [ 668.252816] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 668.252836] __alloc_skb+0x155/0x770 [ 668.271924] ? skb_scrub_packet+0x490/0x490 [ 668.276266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.281041] ? retint_kernel+0x10/0x10 [ 668.284963] ? __ip6_append_data.isra.47+0x525/0x3600 [ 668.290166] __ip6_append_data.isra.47+0x27a4/0x3600 [ 668.295280] ? lock_downgrade+0x8f0/0x8f0 [ 668.299443] ? kasan_check_read+0x11/0x20 [ 668.303610] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 668.308638] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 668.313327] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 668.314867] F2FS-fs (loop4): Unable to read 1th superblock [ 668.317674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.317689] ? ip6_setup_cork+0x120b/0x1ac0 [ 668.317711] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 668.317733] ? mark_held_locks+0xc9/0x160 [ 668.339804] F2FS-fs (loop4): Unable to read 2th superblock [ 668.342269] ? __local_bh_enable_ip+0x161/0x230 [ 668.342286] ? __local_bh_enable_ip+0x161/0x230 [ 668.342303] ? lockdep_hardirqs_on+0x421/0x5c0 [ 668.342319] ? trace_hardirqs_on+0xbd/0x2c0 [ 668.342338] ? lock_release+0x9f0/0x9f0 [ 668.370136] ? lock_sock_nested+0xe7/0x120 [ 668.374392] ip6_append_data+0x1b4/0x2d0 [ 668.378468] ? rawv6_mh_filter_unregister+0xe0/0xe0 07:42:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfffffff6}) 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1aa, 0x7000000) 07:42:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2000000000000000]}}]}, 0x68}}, 0x0) 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xf8, 0x7000000) 07:42:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r2 = dup2(r0, r1) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x18, 0x1}) fcntl$setlease(r2, 0x400, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000240)={0x1f, {{0xa, 0x4e20, 0x6, @remote}}}, 0x88) 07:42:27 executing program 5: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x200000) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 668.383505] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 668.388540] rawv6_sendmsg+0x11cb/0x4720 [ 668.392632] ? rawv6_getsockopt+0x140/0x140 [ 668.396979] ? print_usage_bug+0xc0/0xc0 [ 668.401051] ? __lock_acquire+0x7fc/0x5020 [ 668.405308] ? graph_lock+0x170/0x170 [ 668.409126] ? mark_held_locks+0x160/0x160 [ 668.413369] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 668.418917] ? aa_label_sk_perm+0x45b/0x8d0 [ 668.423256] ? aa_profile_af_perm+0x430/0x430 [ 668.427767] ? find_held_lock+0x36/0x1c0 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x48, 0x7000000) [ 668.431848] ? lock_downgrade+0x8f0/0x8f0 [ 668.436030] ? aa_af_perm+0x5a0/0x5a0 [ 668.439852] inet_sendmsg+0x1a1/0x690 [ 668.443665] ? rawv6_getsockopt+0x140/0x140 [ 668.447998] ? inet_sendmsg+0x1a1/0x690 [ 668.451985] ? ipip_gro_receive+0x100/0x100 [ 668.456324] ? apparmor_socket_sendmsg+0x29/0x30 [ 668.461110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.466664] ? security_socket_sendmsg+0x94/0xc0 [ 668.471429] ? ipip_gro_receive+0x100/0x100 [ 668.475765] sock_sendmsg+0xd5/0x120 [ 668.479491] ___sys_sendmsg+0x51d/0x930 [ 668.483480] ? copy_msghdr_from_user+0x580/0x580 [ 668.488255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.493028] ? lockdep_hardirqs_on+0x421/0x5c0 [ 668.497631] ? retint_kernel+0x10/0x10 [ 668.501529] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 668.506469] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.511235] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 668.516699] ? __fget_light+0x2f7/0x440 [ 668.520691] ? fget_raw+0x20/0x20 [ 668.524162] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.528932] ? retint_kernel+0x10/0x10 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x120, 0x7000000) [ 668.532833] ? __sys_sendmmsg+0x1bd/0x6f0 [ 668.536996] ? __sys_sendmmsg+0x1cb/0x6f0 [ 668.541161] __sys_sendmmsg+0x240/0x6f0 [ 668.545154] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 668.549493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.554264] ? lockdep_hardirqs_on+0x421/0x5c0 [ 668.558854] ? retint_kernel+0x10/0x10 [ 668.562755] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 668.567712] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.572492] ? retint_kernel+0x10/0x10 [ 668.576403] __x64_sys_sendmmsg+0x9d/0x100 [ 668.580658] ? do_syscall_64+0x1a3/0x820 07:42:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x56, 0x7000000) [ 668.584730] do_syscall_64+0x1b9/0x820 [ 668.588632] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 668.594012] ? syscall_return_slowpath+0x5e0/0x5e0 [ 668.598958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 668.603818] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 668.608849] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 668.613881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.619438] ? prepare_exit_to_usermode+0x291/0x3b0 [ 668.624485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 668.629349] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:42:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x18e, 0x7000000) [ 668.634544] RIP: 0033:0x457099 [ 668.637744] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.656658] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 668.664385] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 668.671674] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 668.678956] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 07:42:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x159, 0x7000000) [ 668.686235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 668.693519] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000001 07:42:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020c000010000000000000000000000003000600d0f418462d1ad432e55f65220000000002000000e000000100018000020000000800120002000200000000000000000006000000030300000000000f000000000000000000000000000000ff07000001ac1414bb000000000000000000000000030005000200000002000000e0006083a6b00eab47ed4be0"], 0x80}}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x4000, 0x0) sendmsg$alg(r2, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000004c0)="4d53b2afc7c20d60e959d9b49cc9b0f0e97683c95405bddabf6230d5bf2b3cfb79c2133913f1ced5a430137fc7550f938227df62f390bf019e2aa8ee3e52f72b6ecb31c45c5474b27368375f923c0831cb7843de2e32ba023d925985e0b68a60123c6d12478d963c21ae97606322af1375ab0feb2b783f8525ae215778ef5cb1440bcb7996f1691de47bfa025ba094c33d4dc7ac42c932556ae93aca83624bdf4c2fd576ab3ac8007a352c4b85abff", 0xaf}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="49dac2f03bd602a0dcbe7985f52b11c873627b023fb0b81699e176bcb517a8fca7bf21967d64a3b35442858e23a2c1db522c8f07763c4ae0a0eb10affcc02b3a36df68421bfb7feb6072e3d05b06ddfb614b1ed65710c8158e0bd8838aba9e9643a66bdb69eeb75bbe795ddd75b77a467cd10a3e550c365856543e1352b7375489c7f863e4c391f78a5baf7a00573a426a2a0c5aa7", 0x95}, {&(0x7f0000001640)="f7396cf9", 0x4}], 0x4, 0x0, 0x0, 0x4000000}, 0x800) [ 668.782313] XFS (loop3): unknown mount option [ö]. 07:42:28 executing program 0 (fault-call:6 fault-nth:2): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 668.842727] XFS (loop3): unknown mount option [ö]. 07:42:28 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000140)="f5d4d890d3d6dfbb18ed7f0000000080000000da9dd573d4f7832abe5830241b944996caff48dd628294ecb73f36bd51de53097514a51883c173293c71d04fc2aab58217692f27826976d14d44a435153ac1bc3b06902de78fc93a5bb4a696d9e5a6466a4e81f291a15d5d435a7ab38f674e2582067506db6e6e2ffdc713ce5b26fe66dcaaf091b3eb589ecfc9aa832cbc61919890277d384a19a0eb495224d0248fc289b62f6d6c793fd7806731884e04a66d6f33ff948a012413adeba39fe133239da3fb39e77b7e5c8aec8c48dea74adad317ef6c58ac3b7aa39531af9a5c") 07:42:28 executing program 1 (fault-call:5 fault-nth:0): syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e0000001007a4a00000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1e14bb000000000000000000000000030005000000001002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x200000000000000}) 07:42:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x4000000]}}]}, 0x68}}, 0x0) 07:42:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb7, 0x7000000) 07:42:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000940)=ANY=[@ANYBLOB="02124b0b0a0000002cbd7000fcdbdf250800120002000100ba6b6e001043ab5506003c0008080000ff00000000000000000000ec4628c0783300000000000000000000000000ff02fbff000000000000000000000001"], 0x50}}, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x1, 0x4, {0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0x1f}}}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)="1e1ca7ccb635d35bb1ad34a075afb985c16553be83eb24ea1b17c88a7ebc02f5973e5ca92bde0d4e29b5f92cf2118f45c40ff68600bf068c29e9ea7f70c0c35c603cf96aa7f59624f1c684ac77d9771054effbf8e206858b7b1ef95899331f2c183127910b6b1a7c2e8552ed029804b23a278bc116b0a7aa5d0e4a0cdf530b061e117cae382ce746b1bfbd83a93312e667bbd39128d87480e237569eab0f90d473b1dc1dd0d19bff6a3b37562d84ab759077a8820c06ff9c83fefad720c3581904e05dcb8e89ecacc9bf36bc3307cb3fb36349ed", 0xd4}, {&(0x7f0000000340)="bb8177036da0ca5f385e9e397601ec89a22148635d8c795040851ab5149fd2a44445b1107b1ef702804e3a04cb337c184f89ed7df48f07021ab48cb6a53bc4a1ce87dc4bb633148d0710ddbff1ac08f102ab248cd667b717fc51976a64a9839a9cdf2a19ff3dc3ddf12dd12d9b4713d00f47be33c44261fb995e0118b7e42debc136ba39e627791928c96a88dc6e9fbc9d3378c6b87a30b184d0cb856a16998ebc3d09d77f7d0a0e40fc1ac877d2c5ad68d597442a74216f07850a72ef920887ee23ac2008a17f8b22af7d4ade69ac622e1e787bfc0987787f8bcf6f567aad47537ab0b809616cdab7ace8cefdc02058b6d3d888c2d084a71c", 0xf9}, {&(0x7f0000000440)="b87a088944e70b2a61c88daf31b5b75b825ac818d80ec4dbd486e61bdb3dc18077634ccdd411c0e48b2d8092966d9fefe8fafe37c77852c82dcc519d69551dfb3529cb115136ceae4bbcd359e9bd4be0c1217b5633c388e38251c4e2cb8dd9e58028d93c49a409a6945c28", 0x6b}, {&(0x7f00000004c0)="07d2496e3bad32b145778a6367a75401b4799a7f1fad94ec8efb9b8b7d361ab606ceceedb7889c6f6a5baf96e0feda8d1c280bc7938ad7b5fc0244757d2548c22c75b14824e8b8713736ca900c4fd350f3a1c936d951d752bf17b4ea387dd0437e751ae4282d79b5a75897e219", 0x6d}], 0x4, &(0x7f0000000540)=[{0xc0, 0x11f, 0x345, "b3607bc1942a75d9cc9ebaa1651e15df38aae4ae68cbb6c51ee46715db8ac62e27aba3e4624f3a03a48fd395db7417ed8849845bcf49fa0f656387e317ba8f8d1ade5149ff4c380f49161110d8f6220e1622fbeff99abbc67329e8f0256aa14ab2e889be1677da106d8be25388130d4c0639afcb1a37d7aac7f6844db0fd4169c74fe76db27b5d920766320dad6990e2231c711c1280f2e3c1c1958265e8f58f067fad16986e368269838ba38d98eaa7"}, {0xa0, 0x0, 0x10001, "c423e80fb74c0ed513b89535fc42d269fc8d7977e02d901e34e3c0c7e28b37738d6efe7ca47d8fe9dc07e9999685845916e6d2dcd15c365a47cfea6334ef8d8010fb4159499a86e4cda28c6b5613d14b45e1ad845c361d77155050687fb04b1bc4b0a61b30a7af7daa5bd0a04e0948598985e310d1a0163dac6c5173e723ac315320fe23943867b230befd68728a"}], 0x160, 0x11}, 0x10) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000740)=0x8) syz_open_dev$mice(&(0x7f00000008c0)='/dev/input/mice\x00', 0x0, 0x400000) r3 = socket$key(0xf, 0x3, 0x2) syz_open_dev$amidi(&(0x7f0000000900)='/dev/amidi#\x00', 0x0, 0x101) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f00000006c0)={&(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ff7000/0x2000)=nil, 0xe000, 0x1}) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000880)={0xfffffffffffffad9, 0x9, 0x2, 0x7, 0x521, 0x3f}) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000001c0)={0x2, 0xd, 0x3f, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 669.045983] FAULT_INJECTION: forcing a failure. [ 669.045983] name failslab, interval 1, probability 0, space 0, times 0 [ 669.057758] CPU: 0 PID: 20092 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 669.066261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.075624] Call Trace: [ 669.078236] dump_stack+0x1c9/0x2b4 [ 669.081896] ? dump_stack_print_info.cold.2+0x52/0x52 [ 669.087129] should_fail.cold.4+0xa/0x11 [ 669.091217] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:42:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000000)={0x14, 0x49, 0x2, {0xaa, 0x1, 0x7}}, 0x14) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)={0x9, 0xffffffff, 0x6, 0x8, 0x3, 0x6, 0x80000001, 0x80000000, 0x40, 0x80, 0x6, 0x7}) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) write$binfmt_elf64(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x719, 0x1ff, 0xfffffffffffffffd, 0x2, 0x3, 0x6, 0x1, 0x15, 0x40, 0xd8, 0x4, 0x3e00000000000, 0x38, 0x2, 0xffffffffffff6ee6, 0x6bc, 0x6}, [{0x3, 0xf0, 0x1, 0x4, 0x10001, 0x9d0, 0x3, 0x80}, {0x6474e553, 0x5, 0x8000, 0x10001, 0x800, 0xfffffffffffffffa, 0x7f, 0x7}], "8ac385b9bb2fc90ec64e339dfe37c8716fdfba029203a66e7a588dfb2c22718cfb584315482907a74a5b4254867d0571e4e9c9448c54eb1e84c8ae9c8a7e7f5f05bf40ff67796320ebb577f33a55a6a539d224dd04585c", [[], [], [], [], [], [], []]}, 0x807) r2 = dup2(r0, r1) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000040)={0x4, 0x0, 0x8, 0x3, 0x301a, 0x1, 0x1f}) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x5, &(0x7f0000000000)=0x7, 0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000020000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000f6ebf35870d6ee3d7e"], 0x80}}, 0x0) [ 669.096348] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.101143] ? retint_kernel+0x10/0x10 [ 669.105061] ? _raw_spin_unlock_irqrestore+0xa1/0xc0 [ 669.110211] ? mod_timer+0x5f4/0x1340 [ 669.114036] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.117171] XFS (loop3): Invalid superblock magic number [ 669.118813] ? mod_timer_pending+0x1430/0x1430 [ 669.118873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.133667] __should_failslab+0x124/0x180 [ 669.137918] should_failslab+0x9/0x14 [ 669.141733] kmem_cache_alloc+0x47/0x710 07:42:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1ad, 0x7000000) 07:42:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x20000000]}}]}, 0x68}}, 0x0) [ 669.145820] skb_clone+0x1be/0x500 [ 669.149374] ? skb_split+0x11f0/0x11f0 [ 669.153272] ? lock_release+0x9f0/0x9f0 [ 669.157260] ? print_usage_bug+0xc0/0xc0 [ 669.161423] neigh_probe+0x59/0x120 [ 669.165069] __neigh_event_send+0x443/0x13c0 [ 669.169520] ? neightbl_fill_parms+0x11b0/0x11b0 [ 669.174291] ? lockdep_hardirqs_on+0x19e/0x5c0 [ 669.178886] ? retint_kernel+0x10/0x10 [ 669.182784] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 669.187736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.192503] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 669.197979] ? print_usage_bug+0xc0/0xc0 [ 669.202071] neigh_resolve_output+0x6e5/0xaf0 [ 669.206600] ? kasan_check_read+0x11/0x20 [ 669.207835] FAULT_INJECTION: forcing a failure. [ 669.207835] name failslab, interval 1, probability 0, space 0, times 0 [ 669.210759] ? rcu_is_watching+0x8c/0x150 [ 669.210780] ? __neigh_event_send+0x13c0/0x13c0 [ 669.210807] ip6_finish_output2+0xc95/0x2820 [ 669.210828] ? find_held_lock+0x36/0x1c0 [ 669.210854] ? ip6_copy_metadata+0xe50/0xe50 [ 669.243675] ? lock_downgrade+0x8f0/0x8f0 [ 669.247838] ? retint_kernel+0x10/0x10 [ 669.251917] ? ip6_mtu+0x48a/0x520 [ 669.255473] ? ip6_mtu+0x160/0x520 [ 669.259018] ? ip6_dst_ifdown+0x4e0/0x4e0 [ 669.263176] ? kasan_check_read+0x11/0x20 [ 669.267333] ip6_finish_output+0x5fe/0xbc0 [ 669.271572] ? ip6_finish_output+0x5fe/0xbc0 [ 669.275987] ip6_output+0x234/0x9d0 [ 669.279619] ? ip6_finish_output+0xbc0/0xbc0 [ 669.284030] ? mark_held_locks+0xc9/0x160 [ 669.288182] ? ip6_fragment+0x3930/0x3930 [ 669.292338] ? __local_bh_enable_ip+0x161/0x230 [ 669.297011] ? lockdep_hardirqs_on+0x421/0x5c0 [ 669.301595] ? lock_release+0x9f0/0x9f0 [ 669.305575] ? lock_sock_nested+0xe7/0x120 [ 669.309893] ip6_local_out+0xc5/0x1b0 [ 669.313704] ip6_send_skb+0xba/0x340 [ 669.317425] ip6_push_pending_frames+0xc5/0xf0 [ 669.322017] rawv6_sendmsg+0x366e/0x4720 [ 669.326114] ? rawv6_getsockopt+0x140/0x140 [ 669.330449] ? print_usage_bug+0xc0/0xc0 [ 669.334510] ? print_usage_bug+0xc0/0xc0 [ 669.338571] ? __lock_acquire+0x7fc/0x5020 [ 669.342813] ? graph_lock+0x170/0x170 [ 669.346635] ? mark_held_locks+0x160/0x160 [ 669.350877] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.356417] ? aa_label_sk_perm+0x45b/0x8d0 [ 669.360748] ? aa_profile_af_perm+0x430/0x430 [ 669.365242] ? lockdep_hardirqs_on+0x421/0x5c0 [ 669.369827] ? find_held_lock+0x36/0x1c0 [ 669.373890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.378681] ? aa_af_perm+0x5a0/0x5a0 [ 669.382496] ? copy_user_generic_unrolled+0x89/0xc0 [ 669.387521] inet_sendmsg+0x1a1/0x690 [ 669.391327] ? rawv6_getsockopt+0x140/0x140 [ 669.395648] ? inet_sendmsg+0x1a1/0x690 [ 669.399633] ? ipip_gro_receive+0x100/0x100 [ 669.403957] ? apparmor_socket_sendmsg+0x29/0x30 [ 669.408724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.414270] ? security_socket_sendmsg+0x94/0xc0 [ 669.419027] ? ipip_gro_receive+0x100/0x100 [ 669.423356] sock_sendmsg+0xd5/0x120 [ 669.427072] ___sys_sendmsg+0x51d/0x930 [ 669.431071] ? copy_msghdr_from_user+0x580/0x580 [ 669.435848] ? lock_downgrade+0x8f0/0x8f0 [ 669.440007] ? __fget_light+0x2f7/0x440 [ 669.443984] ? fget_raw+0x20/0x20 [ 669.447445] ? lock_downgrade+0x8f0/0x8f0 [ 669.451595] ? lockdep_hardirqs_on+0x421/0x5c0 [ 669.456185] ? retint_kernel+0x10/0x10 [ 669.460085] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 669.465023] ? proc_fail_nth_write+0x9e/0x210 [ 669.469521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.474283] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 669.479746] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.485294] ? sockfd_lookup_light+0xc5/0x160 [ 669.489794] __sys_sendmmsg+0x240/0x6f0 [ 669.493784] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 669.498120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.502887] ? lockdep_hardirqs_on+0x421/0x5c0 [ 669.507478] ? retint_kernel+0x10/0x10 [ 669.511372] ? lock_is_held_type+0x18b/0x210 [ 669.515784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.520550] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 669.526020] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.530790] ? retint_kernel+0x10/0x10 [ 669.534700] __x64_sys_sendmmsg+0x9d/0x100 [ 669.538944] do_syscall_64+0x1b9/0x820 [ 669.542841] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 669.548214] ? syscall_return_slowpath+0x5e0/0x5e0 [ 669.553150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 669.557995] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 669.563019] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 669.568041] ? prepare_exit_to_usermode+0x291/0x3b0 [ 669.573069] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 669.577950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.583146] RIP: 0033:0x457099 [ 669.586343] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.605251] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 669.612973] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 669.620250] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 669.627526] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 669.634796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 669.642070] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000002 [ 669.649379] CPU: 1 PID: 20121 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 669.657884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.667247] Call Trace: [ 669.669852] dump_stack+0x1c9/0x2b4 [ 669.673494] ? dump_stack_print_info.cold.2+0x52/0x52 [ 669.678700] ? graph_lock+0x170/0x170 [ 669.682521] should_fail.cold.4+0xa/0x11 [ 669.686598] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 669.691717] ? print_usage_bug+0xc0/0xc0 [ 669.695796] ? graph_lock+0x170/0x170 [ 669.699624] ? find_held_lock+0x36/0x1c0 [ 669.703697] ? __lock_is_held+0xb5/0x140 [ 669.707781] ? check_same_owner+0x340/0x340 [ 669.712129] ? rcu_note_context_switch+0x680/0x680 [ 669.717094] __should_failslab+0x124/0x180 [ 669.721350] should_failslab+0x9/0x14 [ 669.725168] kmem_cache_alloc_node+0x256/0x720 [ 669.730073] __alloc_skb+0x119/0x770 [ 669.733821] ? skb_scrub_packet+0x490/0x490 [ 669.738168] ? find_held_lock+0x36/0x1c0 [ 669.742251] __ip6_append_data.isra.47+0x27a4/0x3600 [ 669.747367] ? lock_downgrade+0x8f0/0x8f0 [ 669.751532] ? kasan_check_read+0x11/0x20 [ 669.755699] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 669.760725] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 669.765416] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 669.769757] ? dst_output+0x180/0x180 [ 669.773576] ? print_usage_bug+0xc0/0xc0 [ 669.777661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.783212] ? ip6_setup_cork+0x120b/0x1ac0 [ 669.787558] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 669.792502] ? mark_held_locks+0xc9/0x160 [ 669.796669] ? __local_bh_enable_ip+0x161/0x230 [ 669.801355] ? __local_bh_enable_ip+0x161/0x230 [ 669.806039] ? lockdep_hardirqs_on+0x421/0x5c0 [ 669.810644] ? trace_hardirqs_on+0xbd/0x2c0 [ 669.814979] ? lock_release+0x9f0/0x9f0 [ 669.818970] ? lock_sock_nested+0xe7/0x120 [ 669.823227] ip6_append_data+0x1b4/0x2d0 [ 669.827304] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 669.832347] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 669.837391] rawv6_sendmsg+0x11cb/0x4720 [ 669.841490] ? rawv6_getsockopt+0x140/0x140 [ 669.845837] ? print_usage_bug+0xc0/0xc0 [ 669.849919] ? __lock_acquire+0x7fc/0x5020 [ 669.854174] ? graph_lock+0x170/0x170 [ 669.857985] ? mark_held_locks+0x160/0x160 [ 669.862722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.868307] ? aa_label_sk_perm+0x45b/0x8d0 [ 669.872665] ? aa_profile_af_perm+0x430/0x430 [ 669.877177] ? find_held_lock+0x36/0x1c0 [ 669.881269] ? lock_downgrade+0x8f0/0x8f0 [ 669.885455] ? aa_af_perm+0x5a0/0x5a0 [ 669.889276] inet_sendmsg+0x1a1/0x690 [ 669.893104] ? rawv6_getsockopt+0x140/0x140 [ 669.897442] ? inet_sendmsg+0x1a1/0x690 [ 669.901433] ? ipip_gro_receive+0x100/0x100 [ 669.905771] ? apparmor_socket_sendmsg+0x29/0x30 [ 669.910548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.916113] ? security_socket_sendmsg+0x94/0xc0 [ 669.920885] ? ipip_gro_receive+0x100/0x100 [ 669.925226] sock_sendmsg+0xd5/0x120 [ 669.928954] ___sys_sendmsg+0x51d/0x930 [ 669.932948] ? copy_msghdr_from_user+0x580/0x580 [ 669.937719] ? lock_downgrade+0x8f0/0x8f0 [ 669.941891] ? __fget_light+0x2f7/0x440 [ 669.945885] ? fget_raw+0x20/0x20 [ 669.949356] ? lock_downgrade+0x8f0/0x8f0 [ 669.953524] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 669.959076] ? proc_fail_nth_write+0x9e/0x210 [ 669.963595] ? proc_cwd_link+0x1d0/0x1d0 [ 669.967688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.973235] ? sockfd_lookup_light+0xc5/0x160 [ 669.977749] __sys_sendmmsg+0x240/0x6f0 [ 669.981742] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 669.986070] ? __lock_is_held+0xb5/0x140 [ 669.990167] ? fput+0x130/0x1a0 [ 669.993449] ? do_syscall_64+0x9a/0x820 [ 669.997426] ? do_syscall_64+0x9a/0x820 [ 670.001407] ? lockdep_hardirqs_on+0x421/0x5c0 [ 670.006029] ? trace_hardirqs_on+0xbd/0x2c0 [ 670.010357] ? __ia32_sys_read+0xb0/0xb0 [ 670.014424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.019790] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 670.024900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.030445] __x64_sys_sendmmsg+0x9d/0x100 [ 670.034691] do_syscall_64+0x1b9/0x820 [ 670.038585] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 670.043961] ? syscall_return_slowpath+0x5e0/0x5e0 [ 670.048894] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 670.053919] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 670.058938] ? recalc_sigpending_tsk+0x180/0x180 [ 670.063704] ? kasan_check_write+0x14/0x20 [ 670.067985] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 670.072846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.078042] RIP: 0033:0x457099 [ 670.081249] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:42:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x12b, 0x7000000) 07:42:29 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000140)="b2f553a120403ec70fdece2cfbe515b05a809c6a800faea2234ed6098ca56a2a0d70c6e1047ac35702b79eaee90afb63d265fe1d91ef508717c8348c7e4ceb4b205e399314e24207e95654bdc60254976fdd5c80a2ad0951cac0520e48f7c6fb7ceaa4f0a0786d8617fe69a6c25d0d5a17d83d6d08724f0d787e7c71fca6bbc6444ed9e61333de190ac8035c7f8867b1fe21a0f9800c06222902eac7c40f968c3d2cc05087cb32f60606659673ecf0f05dce8629a2988ee31fec2168fa996e0bd058e089c7a6af20a779f2902843770cbf4f8f0ce9df8d88602f7d6d6a26c0e69c65e43a1152aef4c19572ec50544c5da764a7773e", &(0x7f0000000000)=""/15}, 0x18) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:29 executing program 0 (fault-call:6 fault-nth:3): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 670.100162] RSP: 002b:00007f7675c86c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 670.107889] RAX: ffffffffffffffda RBX: 00007f7675c876d4 RCX: 0000000000457099 [ 670.115172] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 670.122453] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 670.129738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 670.137021] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000000 [ 670.192449] FAULT_INJECTION: forcing a failure. [ 670.192449] name failslab, interval 1, probability 0, space 0, times 0 [ 670.203812] CPU: 1 PID: 20152 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 670.212315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.221678] Call Trace: [ 670.224287] dump_stack+0x1c9/0x2b4 [ 670.227946] ? dump_stack_print_info.cold.2+0x52/0x52 [ 670.233175] should_fail.cold.4+0xa/0x11 [ 670.237257] ? __kernel_text_address+0xd/0x40 [ 670.241778] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 670.246906] ? __save_stack_trace+0x8d/0xf0 [ 670.251271] ? graph_lock+0x170/0x170 [ 670.255107] ? save_stack+0x43/0xd0 [ 670.258768] ? kasan_kmalloc+0xc4/0xe0 [ 670.262689] ? find_held_lock+0x36/0x1c0 [ 670.266768] ? __lock_is_held+0xb5/0x140 [ 670.270859] ? check_same_owner+0x340/0x340 [ 670.275208] ? mark_held_locks+0xc9/0x160 [ 670.279374] ? rcu_note_context_switch+0x680/0x680 [ 670.284315] ? kmem_cache_alloc_node+0x217/0x720 07:42:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x240000) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000040)={0x7, 0x528f, 0x4, 0x7, 0x400, 0x7f, 0x401, 0x5, 0xffffffffffff0000, 0x4}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414fb00030005000000000002000000e000000100000000000000000000000000000000000000"], 0x80}}, 0x0) 07:42:29 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8001000000000200) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0xc, 0x0, 0x0, 0x1ffffe55}, 0x10}}, 0x0) 07:42:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x1000000000000}) [ 670.289110] __should_failslab+0x124/0x180 [ 670.293368] should_failslab+0x9/0x14 [ 670.297191] kmem_cache_alloc_node_trace+0x259/0x720 [ 670.302326] __kmalloc_node_track_caller+0x33/0x70 [ 670.307279] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 670.312062] __alloc_skb+0x155/0x770 [ 670.315810] ? skb_scrub_packet+0x490/0x490 [ 670.320165] ? find_held_lock+0x36/0x1c0 [ 670.324258] __ip6_append_data.isra.47+0x27a4/0x3600 [ 670.329385] ? lock_downgrade+0x8f0/0x8f0 [ 670.333565] ? kasan_check_read+0x11/0x20 [ 670.337748] ? rawv6_mh_filter_unregister+0xe0/0xe0 07:42:29 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x195, 0x7000000) 07:42:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="748561bc223671fabac9de411093bd807ff2e6f98b8ca30e9a528fd93db351be688d18f1606a25108c90b9f4c757eca3f71ef0addbd3e89b6c3db10097f0573dbdbb78bea2e34808c99e4a4ccbb09f741c2026e6517425a1b78d30d5fc8e6f41170943bbca375aee34d75022570ef4bca13249a20b34855deb34b1c718bd939b", 0x80, 0xfffffffffffffffa) r3 = add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$reject(0x13, r2, 0x9193, 0x2d5d4072, r3) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000000c0)) [ 670.342793] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 670.347501] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 670.351853] ? dst_output+0x180/0x180 [ 670.355690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.361253] ? ip6_setup_cork+0x120b/0x1ac0 [ 670.365614] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 670.370568] ? mark_held_locks+0xc9/0x160 [ 670.374748] ? __local_bh_enable_ip+0x161/0x230 [ 670.379446] ? __local_bh_enable_ip+0x161/0x230 [ 670.384141] ? lockdep_hardirqs_on+0x421/0x5c0 [ 670.388744] ? trace_hardirqs_on+0xbd/0x2c0 [ 670.393098] ? lock_release+0x9f0/0x9f0 [ 670.397100] ? lock_sock_nested+0xe7/0x120 [ 670.401356] ip6_append_data+0x1b4/0x2d0 [ 670.405434] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 670.410474] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 670.415514] rawv6_sendmsg+0x11cb/0x4720 [ 670.419613] ? rawv6_getsockopt+0x140/0x140 [ 670.423961] ? print_usage_bug+0xc0/0xc0 [ 670.428032] ? __lock_acquire+0x7fc/0x5020 [ 670.432285] ? graph_lock+0x170/0x170 [ 670.436109] ? print_usage_bug+0xc0/0xc0 [ 670.440183] ? mark_held_locks+0x160/0x160 [ 670.444436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.449991] ? aa_label_sk_perm+0x45b/0x8d0 [ 670.454332] ? aa_profile_af_perm+0x430/0x430 [ 670.458847] ? find_held_lock+0x36/0x1c0 [ 670.462935] ? lock_downgrade+0x8f0/0x8f0 [ 670.467131] ? aa_af_perm+0x5a0/0x5a0 [ 670.470954] inet_sendmsg+0x1a1/0x690 [ 670.474768] ? rawv6_getsockopt+0x140/0x140 [ 670.479110] ? inet_sendmsg+0x1a1/0x690 [ 670.483115] ? ipip_gro_receive+0x100/0x100 [ 670.487458] ? apparmor_socket_sendmsg+0x29/0x30 [ 670.492235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.497788] ? security_socket_sendmsg+0x94/0xc0 [ 670.502558] ? ipip_gro_receive+0x100/0x100 [ 670.506893] sock_sendmsg+0xd5/0x120 [ 670.510627] ___sys_sendmsg+0x51d/0x930 [ 670.514619] ? graph_lock+0x170/0x170 [ 670.518433] ? copy_msghdr_from_user+0x580/0x580 [ 670.523207] ? find_held_lock+0x36/0x1c0 [ 670.527293] ? lock_downgrade+0x8f0/0x8f0 [ 670.531463] ? rcu_note_context_switch+0x680/0x680 [ 670.536406] ? check_same_owner+0x340/0x340 [ 670.540748] __sys_sendmmsg+0x240/0x6f0 [ 670.544738] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 670.549090] ? __lock_is_held+0xb5/0x140 [ 670.553182] ? fput+0x130/0x1a0 [ 670.556473] ? do_syscall_64+0x9a/0x820 [ 670.560460] ? do_syscall_64+0x9a/0x820 [ 670.564445] ? lockdep_hardirqs_on+0x421/0x5c0 [ 670.569040] ? trace_hardirqs_on+0xbd/0x2c0 [ 670.573388] ? __ia32_sys_read+0xb0/0xb0 [ 670.577466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.582846] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 670.587973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.593536] __x64_sys_sendmmsg+0x9d/0x100 [ 670.597792] do_syscall_64+0x1b9/0x820 [ 670.601691] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 670.607072] ? syscall_return_slowpath+0x5e0/0x5e0 [ 670.612035] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 670.617076] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 670.622130] ? recalc_sigpending_tsk+0x180/0x180 [ 670.626904] ? kasan_check_write+0x14/0x20 [ 670.631158] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 670.636032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.641271] RIP: 0033:0x457099 [ 670.644478] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.663403] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 670.671144] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 670.678429] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 670.685714] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 07:42:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000000, 0x3) ioctl(r1, 0x8912, &(0x7f00000000c0)="a16faf76c692fe59f9f4") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') openat$cgroup_procs(r0, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0xffff) 07:42:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb3, 0x7000000) [ 670.693001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 670.700291] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000003 07:42:30 executing program 0 (fault-call:6 fault-nth:4): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:30 executing program 6: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x20000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000140)={0x4, 0x3, {0xffffffffffffffff, 0x3, 0x3a5d4, 0x0, 0x34}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000003c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x4bd, 0xfffffffffffff001, 0x200, 0x94e, 0x7, 0x7fff, 0x6, 0xe1, 0x0}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000002c0)={r3, 0xffffffffffff0001}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x14) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r4, 0x1, 0x1}, &(0x7f0000000380)=0xc) 07:42:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000300)=ANY=[]}}, 0x8000) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x201) ioctl$sock_bt(r2, 0x40000000000541a, &(0x7f00000002c0)="ec7dc014c46d2f245d2fa774e179425160720b37be072be8bcf7090a47cd185969545c292a61bd143f4cfd5fcfd1446371043d0e25c1468caec3d78814bd5ac9f496211aedc7c7aee8b2d237aa0aaa94cd20db5f5bb5bb50a3668b69703b4befcad720de661e46eb68e1f209b698584f9eb2f81b647cd48a8cff313a57bbcb5a297ac80222338967503de9b33e07634626df9777ca4eecdea21c71ab3d3ef147833dd6b8450562c53fabaa952c9f02e0c87164188ffa28631e32dae5de1e89a38f6e4585f1c37fd24236051ca4ed3cf9d866a4a827aa2389c679505e4444146625298cdd97ca6871bbddad5d022ba170edc9e2cd7d049f3ae9058e009479a732f48ffc3fb023a621b79f8a73ed3e464ff46135fce2a85027d158039f33fb72c868602a7212bb563a98a65369785871") fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000000c0)=0x5) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040)=0x2, 0x4) 07:42:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x4]}}]}, 0x68}}, 0x0) 07:42:30 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000027, 0x0) [ 670.798507] XFS (loop3): Invalid superblock magic number 07:42:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb4, 0x7000000) 07:42:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xc0000001}) [ 670.971471] FAULT_INJECTION: forcing a failure. [ 670.971471] name failslab, interval 1, probability 0, space 0, times 0 [ 670.983205] CPU: 0 PID: 20210 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 670.991713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.001070] Call Trace: [ 671.003691] dump_stack+0x1c9/0x2b4 [ 671.007337] ? dump_stack_print_info.cold.2+0x52/0x52 [ 671.012567] ? print_usage_bug+0xc0/0xc0 [ 671.016655] should_fail.cold.4+0xa/0x11 [ 671.020736] ? group_sched_in+0x17d/0x400 [ 671.024910] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 671.030039] ? mark_held_locks+0xc9/0x160 [ 671.034228] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.039001] ? lockdep_hardirqs_on+0x421/0x5c0 [ 671.043593] ? retint_kernel+0x10/0x10 [ 671.047498] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 671.052445] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.057224] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 671.062695] ? find_held_lock+0x36/0x1c0 [ 671.066785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.071567] ? retint_kernel+0x10/0x10 [ 671.075491] __should_failslab+0x124/0x180 [ 671.079748] should_failslab+0x9/0x14 [ 671.083567] kmem_cache_alloc_node+0x256/0x720 [ 671.088167] ? graph_lock+0x170/0x170 [ 671.091990] __alloc_skb+0x119/0x770 [ 671.095726] ? skb_scrub_packet+0x490/0x490 [ 671.100064] ? find_held_lock+0x36/0x1c0 [ 671.104177] ? mark_held_locks+0xc9/0x160 [ 671.108357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.113148] __ip6_append_data.isra.47+0x27a4/0x3600 [ 671.118285] ? kasan_check_read+0x11/0x20 [ 671.122459] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 671.127510] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.132305] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 671.136659] ? ip6_setup_cork+0x11d1/0x1ac0 [ 671.141006] ? ip6_setup_cork+0x120b/0x1ac0 [ 671.145359] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 671.150334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.155144] ? retint_kernel+0x10/0x10 [ 671.159053] ip6_append_data+0x1b4/0x2d0 [ 671.163146] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 671.168184] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 671.173229] rawv6_sendmsg+0x11cb/0x4720 [ 671.177321] ? rawv6_getsockopt+0x140/0x140 [ 671.181674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 671.187223] ? flexible_sched_in+0x121/0xc10 [ 671.191649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.196419] ? lockdep_hardirqs_on+0x421/0x5c0 [ 671.201013] ? retint_kernel+0x10/0x10 [ 671.204906] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 671.209838] ? graph_lock+0x170/0x170 [ 671.213660] ? graph_lock+0x170/0x170 [ 671.217473] ? print_usage_bug+0xc0/0xc0 [ 671.221546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 671.227116] ? aa_label_sk_perm+0x45b/0x8d0 [ 671.231457] ? aa_profile_af_perm+0x430/0x430 [ 671.235966] ? find_held_lock+0x36/0x1c0 [ 671.240045] ? lock_downgrade+0x8f0/0x8f0 [ 671.244236] ? aa_af_perm+0x5a0/0x5a0 [ 671.248059] inet_sendmsg+0x1a1/0x690 [ 671.251889] ? rawv6_getsockopt+0x140/0x140 [ 671.256218] ? inet_sendmsg+0x1a1/0x690 [ 671.260207] ? ipip_gro_receive+0x100/0x100 [ 671.264544] ? apparmor_socket_sendmsg+0x29/0x30 [ 671.269314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.274858] ? security_socket_sendmsg+0x94/0xc0 [ 671.279624] ? ipip_gro_receive+0x100/0x100 [ 671.283962] sock_sendmsg+0xd5/0x120 [ 671.287690] ___sys_sendmsg+0x51d/0x930 [ 671.291677] ? graph_lock+0x170/0x170 [ 671.295493] ? copy_msghdr_from_user+0x580/0x580 [ 671.300261] ? lockdep_hardirqs_on+0x421/0x5c0 [ 671.304853] ? retint_kernel+0x10/0x10 [ 671.308753] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 671.313700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.318462] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 671.323932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.328710] ? retint_kernel+0x10/0x10 [ 671.332618] ? rcu_note_context_switch+0x680/0x680 [ 671.337575] __sys_sendmmsg+0x240/0x6f0 [ 671.341565] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 671.345903] ? __lock_is_held+0xb5/0x140 [ 671.349994] ? fput+0x130/0x1a0 [ 671.353290] ? do_syscall_64+0x9a/0x820 [ 671.357277] ? do_syscall_64+0x9a/0x820 [ 671.361258] ? lockdep_hardirqs_on+0x421/0x5c0 [ 671.365859] ? trace_hardirqs_on+0xbd/0x2c0 [ 671.370198] ? __ia32_sys_read+0xb0/0xb0 [ 671.374277] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.379664] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 671.384798] __x64_sys_sendmmsg+0x9d/0x100 [ 671.389051] do_syscall_64+0x1b9/0x820 [ 671.392974] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 671.398359] ? syscall_return_slowpath+0x5e0/0x5e0 [ 671.403307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 671.408161] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 671.413189] ? prepare_exit_to_usermode+0x3b0/0x3b0 07:42:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2000000]}}]}, 0x68}}, 0x0) 07:42:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0x4, &(0x7f0000000140)=0x1) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d00001000000000c40b218f5063f04bdf7d9febf9201f3a00000000000000030006000000000002000000e0000001000040000000000008001200020002000e0000000000000030000000030300000000000f000000000000000000b78c3f8ff0efdff30000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x91, 0x7000000) 07:42:30 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x8d, 0x7000000) 07:42:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f0000000000)='jet/snmp\x00') 07:42:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x60, 0x7000000) 07:42:30 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000006, 0xff) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x10000}, &(0x7f0000000180)=0xc) 07:42:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x113, 0x7000000) [ 671.418224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.423783] ? prepare_exit_to_usermode+0x291/0x3b0 [ 671.428819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 671.433686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.438888] RIP: 0033:0x457099 [ 671.442109] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.461026] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 671.468768] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 671.476058] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 671.483363] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 671.490648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 671.497975] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000004 [ 671.625840] XFS (loop3): unknown mount option []. 07:42:31 executing program 0 (fault-call:6 fault-nth:5): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:31 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000000e, 0x0) 07:42:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x164, 0x7000000) 07:42:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ff0d0000100000000000000000000000030006000000000002730000e000000100000000000000000800120002000200000000000000000030000000030300000000000f00564eba68a9993ffd0000000000000000000001ac1414bb000000000000000000000000030005186da81ed6d69f960e411df4010000000000000000"], 0x80}}, 0x0) 07:42:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffff7f]}}]}, 0x68}}, 0x0) 07:42:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) bind$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) [ 671.735173] XFS (loop3): unknown mount option []. 07:42:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x70000000}) 07:42:31 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000000)=0x5) 07:42:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) accept(r1, &(0x7f0000000000)=@hci, &(0x7f00000000c0)=0x80) 07:42:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xd4, 0x7000000) [ 671.805986] FAULT_INJECTION: forcing a failure. [ 671.805986] name failslab, interval 1, probability 0, space 0, times 0 [ 671.817394] CPU: 1 PID: 20301 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 671.825916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.835285] Call Trace: [ 671.837894] dump_stack+0x1c9/0x2b4 [ 671.841546] ? dump_stack_print_info.cold.2+0x52/0x52 [ 671.846770] should_fail.cold.4+0xa/0x11 [ 671.850851] ? __kernel_text_address+0xd/0x40 07:42:31 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000025, 0x0) 07:42:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0xd, 0x2, 0x0, 0x2}, 0x10}}, 0x0) 07:42:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x1000000]}}]}, 0x68}}, 0x0) [ 671.855375] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 671.860505] ? __save_stack_trace+0x8d/0xf0 [ 671.864866] ? graph_lock+0x170/0x170 [ 671.868689] ? save_stack+0x43/0xd0 [ 671.872332] ? kasan_kmalloc+0xc4/0xe0 [ 671.876241] ? find_held_lock+0x36/0x1c0 [ 671.880326] ? __lock_is_held+0xb5/0x140 [ 671.884494] ? __rhashtable_remove_fast.constprop.46+0xc68/0x11c0 [ 671.890762] ? check_same_owner+0x340/0x340 [ 671.895112] ? mark_held_locks+0xc9/0x160 [ 671.899282] ? rcu_note_context_switch+0x680/0x680 [ 671.904232] ? kmem_cache_alloc_node+0x217/0x720 [ 671.909012] __should_failslab+0x124/0x180 [ 671.913267] should_failslab+0x9/0x14 [ 671.917098] kmem_cache_alloc_node_trace+0x259/0x720 [ 671.922232] __kmalloc_node_track_caller+0x33/0x70 [ 671.927183] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 671.931951] __alloc_skb+0x155/0x770 [ 671.935690] ? skb_scrub_packet+0x490/0x490 [ 671.940045] ? find_held_lock+0x36/0x1c0 [ 671.944148] __ip6_append_data.isra.47+0x27a4/0x3600 [ 671.949274] ? lock_downgrade+0x8f0/0x8f0 [ 671.953448] ? kasan_check_read+0x11/0x20 [ 671.957621] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 671.962664] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 671.967364] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 671.971703] ? dst_output+0x180/0x180 [ 671.975538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.981105] ? ip6_setup_cork+0x120b/0x1ac0 [ 671.985456] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 671.990407] ? mark_held_locks+0xc9/0x160 [ 671.994569] ? __local_bh_enable_ip+0x161/0x230 [ 671.999257] ? __local_bh_enable_ip+0x161/0x230 [ 672.003938] ? lockdep_hardirqs_on+0x421/0x5c0 [ 672.008532] ? trace_hardirqs_on+0xbd/0x2c0 [ 672.012866] ? lock_release+0x9f0/0x9f0 [ 672.016853] ? lock_sock_nested+0xe7/0x120 [ 672.021114] ip6_append_data+0x1b4/0x2d0 [ 672.025200] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 672.030232] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 672.035264] rawv6_sendmsg+0x11cb/0x4720 [ 672.039357] ? rawv6_getsockopt+0x140/0x140 [ 672.043699] ? print_usage_bug+0xc0/0xc0 [ 672.047767] ? __lock_acquire+0x7fc/0x5020 [ 672.052017] ? graph_lock+0x170/0x170 07:42:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x173, 0x7000000) [ 672.055831] ? print_usage_bug+0xc0/0xc0 [ 672.059900] ? mark_held_locks+0x160/0x160 [ 672.064154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.069705] ? aa_label_sk_perm+0x45b/0x8d0 [ 672.074048] ? aa_profile_af_perm+0x430/0x430 [ 672.078569] ? find_held_lock+0x36/0x1c0 [ 672.082657] ? lock_downgrade+0x8f0/0x8f0 [ 672.086840] ? aa_af_perm+0x5a0/0x5a0 [ 672.090663] inet_sendmsg+0x1a1/0x690 [ 672.094478] ? rawv6_getsockopt+0x140/0x140 [ 672.098807] ? inet_sendmsg+0x1a1/0x690 [ 672.102795] ? ipip_gro_receive+0x100/0x100 [ 672.107136] ? apparmor_socket_sendmsg+0x29/0x30 [ 672.111906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.117461] ? security_socket_sendmsg+0x94/0xc0 [ 672.122228] ? ipip_gro_receive+0x100/0x100 [ 672.126565] sock_sendmsg+0xd5/0x120 [ 672.130302] ___sys_sendmsg+0x51d/0x930 [ 672.134285] ? graph_lock+0x170/0x170 [ 672.138115] ? copy_msghdr_from_user+0x580/0x580 [ 672.142891] ? find_held_lock+0x36/0x1c0 [ 672.146974] ? lock_downgrade+0x8f0/0x8f0 [ 672.151150] ? rcu_note_context_switch+0x680/0x680 [ 672.156101] ? check_same_owner+0x340/0x340 [ 672.160440] __sys_sendmmsg+0x240/0x6f0 [ 672.164432] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 672.168782] ? __lock_is_held+0xb5/0x140 [ 672.172871] ? fput+0x130/0x1a0 [ 672.176163] ? do_syscall_64+0x9a/0x820 [ 672.180151] ? do_syscall_64+0x9a/0x820 [ 672.184137] ? lockdep_hardirqs_on+0x421/0x5c0 [ 672.188732] ? trace_hardirqs_on+0xbd/0x2c0 [ 672.193067] ? __ia32_sys_read+0xb0/0xb0 [ 672.197157] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.202531] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 672.207647] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.213209] __x64_sys_sendmmsg+0x9d/0x100 [ 672.217463] do_syscall_64+0x1b9/0x820 [ 672.221368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 672.226747] ? syscall_return_slowpath+0x5e0/0x5e0 [ 672.231689] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 672.236723] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 672.241757] ? recalc_sigpending_tsk+0x180/0x180 [ 672.246528] ? kasan_check_write+0x14/0x20 [ 672.250795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 672.255662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.260861] RIP: 0033:0x457099 [ 672.264060] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.282984] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 672.290709] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 672.297992] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 07:42:31 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000000c0)=@hopopts={0x2c, 0x3, [], [@jumbo={0xc2, 0x4, 0x2008}, @hao={0xc9, 0x10, @mcast1}]}, 0x20) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') open(&(0x7f0000000000)='./file0\x00', 0x100, 0x2) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 07:42:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xaf, 0x7000000) [ 672.305271] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 672.312547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 672.319823] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000005 07:42:31 executing program 0 (fault-call:6 fault-nth:6): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:31 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000018, 0x0) 07:42:31 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = add_key(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)="6d8bacbdac98c9536f4a4a92f60cf55e3b9a31a97ff122cc6e52d974086912067041ff721cbdafad7c7f1021d14af39fc44b43e8540d4379e4fca7bb1b746e3f272d3bd9c424c23b19a99b81f39eab93e177f302f67b471f71ff432c7ca7b2dd22b42cb4db7038a505e27a2438a930101b5e461f0b9dea0401dcdaffa3a9a1cce23cc4ccdef35408e000be16", 0x8c, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="498a5bde357f6481bc170479a33e0191c62b35ba555cc1095dc9e6bf4e7a8e9dc5a0ea569ac41741aa09f38b0f2f4a05343238bd56fc2598f9dbb5e82575906db965e632a0e950658da4a7", 0x4b, r1) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x9, &(0x7f0000000180)="0a5cc80700315f85715070c69ca5b5aba620b36b34a3bd45c9c5456828c412893334010fb9bdb4120b1276bd3664") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffff7f00000000]}}]}, 0x68}}, 0x0) 07:42:31 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x501800, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7b6f, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 672.491011] XFS (loop3): Invalid superblock magic number [ 672.522841] FAULT_INJECTION: forcing a failure. [ 672.522841] name failslab, interval 1, probability 0, space 0, times 0 [ 672.534498] CPU: 1 PID: 20359 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 672.543012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.552377] Call Trace: [ 672.554987] dump_stack+0x1c9/0x2b4 [ 672.558642] ? dump_stack_print_info.cold.2+0x52/0x52 [ 672.563847] ? graph_lock+0x170/0x170 [ 672.567675] should_fail.cold.4+0xa/0x11 [ 672.571763] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 672.576885] ? print_usage_bug+0xc0/0xc0 [ 672.580974] ? graph_lock+0x170/0x170 [ 672.584799] ? find_held_lock+0x36/0x1c0 [ 672.588883] ? __lock_is_held+0xb5/0x140 [ 672.592973] ? check_same_owner+0x340/0x340 [ 672.597319] ? rcu_note_context_switch+0x680/0x680 [ 672.602277] __should_failslab+0x124/0x180 [ 672.606535] should_failslab+0x9/0x14 [ 672.610363] kmem_cache_alloc_node+0x256/0x720 [ 672.614976] __alloc_skb+0x119/0x770 [ 672.618715] ? skb_scrub_packet+0x490/0x490 [ 672.623062] ? find_held_lock+0x36/0x1c0 [ 672.627158] __ip6_append_data.isra.47+0x27a4/0x3600 [ 672.632275] ? lock_downgrade+0x8f0/0x8f0 [ 672.636452] ? kasan_check_read+0x11/0x20 [ 672.640630] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 672.645666] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 672.650367] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 672.654711] ? dst_output+0x180/0x180 [ 672.658544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.664132] ? ip6_setup_cork+0x120b/0x1ac0 [ 672.668480] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 672.673431] ? mark_held_locks+0xc9/0x160 [ 672.677611] ? __local_bh_enable_ip+0x161/0x230 [ 672.682303] ? __local_bh_enable_ip+0x161/0x230 [ 672.686994] ? lockdep_hardirqs_on+0x421/0x5c0 [ 672.691608] ? trace_hardirqs_on+0xbd/0x2c0 [ 672.695954] ? lock_release+0x9f0/0x9f0 [ 672.699951] ? lock_sock_nested+0xe7/0x120 [ 672.704210] ip6_append_data+0x1b4/0x2d0 [ 672.708294] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 672.713330] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 672.718364] rawv6_sendmsg+0x11cb/0x4720 [ 672.722455] ? rawv6_getsockopt+0x140/0x140 [ 672.726798] ? print_usage_bug+0xc0/0xc0 [ 672.730873] ? __lock_acquire+0x7fc/0x5020 [ 672.735129] ? graph_lock+0x170/0x170 [ 672.738923] ? print_usage_bug+0xc0/0xc0 [ 672.742971] ? mark_held_locks+0x160/0x160 [ 672.747200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.752742] ? aa_label_sk_perm+0x45b/0x8d0 [ 672.757063] ? aa_profile_af_perm+0x430/0x430 [ 672.761557] ? find_held_lock+0x36/0x1c0 [ 672.765649] ? lock_downgrade+0x8f0/0x8f0 [ 672.769827] ? aa_af_perm+0x5a0/0x5a0 [ 672.773621] inet_sendmsg+0x1a1/0x690 [ 672.777412] ? rawv6_getsockopt+0x140/0x140 [ 672.781732] ? inet_sendmsg+0x1a1/0x690 [ 672.785713] ? ipip_gro_receive+0x100/0x100 [ 672.790028] ? apparmor_socket_sendmsg+0x29/0x30 [ 672.794773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.800302] ? security_socket_sendmsg+0x94/0xc0 [ 672.805046] ? ipip_gro_receive+0x100/0x100 [ 672.809357] sock_sendmsg+0xd5/0x120 [ 672.813069] ___sys_sendmsg+0x51d/0x930 [ 672.817041] ? graph_lock+0x170/0x170 [ 672.820832] ? copy_msghdr_from_user+0x580/0x580 [ 672.825582] ? find_held_lock+0x36/0x1c0 [ 672.829648] ? lock_downgrade+0x8f0/0x8f0 [ 672.833794] ? rcu_note_context_switch+0x680/0x680 [ 672.838710] ? check_same_owner+0x340/0x340 [ 672.843036] __sys_sendmmsg+0x240/0x6f0 [ 672.847017] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 672.851353] ? __lock_is_held+0xb5/0x140 [ 672.855422] ? fput+0x130/0x1a0 [ 672.858688] ? do_syscall_64+0x9a/0x820 [ 672.862663] ? do_syscall_64+0x9a/0x820 [ 672.866636] ? lockdep_hardirqs_on+0x421/0x5c0 [ 672.871213] ? trace_hardirqs_on+0xbd/0x2c0 [ 672.875536] ? __ia32_sys_read+0xb0/0xb0 [ 672.879612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.884973] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 672.890064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.895631] __x64_sys_sendmmsg+0x9d/0x100 [ 672.899852] do_syscall_64+0x1b9/0x820 [ 672.903725] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 672.909109] ? syscall_return_slowpath+0x5e0/0x5e0 [ 672.914038] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 672.919052] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 672.924071] ? recalc_sigpending_tsk+0x180/0x180 [ 672.928829] ? kasan_check_write+0x14/0x20 [ 672.933064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 672.937954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.943669] RIP: 0033:0x457099 [ 672.946874] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.965780] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 672.973489] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 672.980761] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 07:42:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x172, 0x7000000) 07:42:32 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000024, 0x0) 07:42:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xf}) 07:42:32 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 672.988015] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 672.995277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 673.002531] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000006 07:42:32 executing program 0 (fault-call:6 fault-nth:7): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x100000000000000]}}]}, 0x68}}, 0x0) 07:42:32 executing program 6: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x6, 0x2042) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0xfffffffffffffff7, 0x4) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000000c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000280)={0x0, 0x5}, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000007c02000000e0000001000000000000000008001200020002004bb300000000000006000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x8) fstat(r1, &(0x7f0000000200)) 07:42:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000240)=""/4096, &(0x7f0000000000)=0x1000) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00800010000000000000000000000000000000000"], 0x80}}, 0x0) [ 673.113549] XFS (loop3): unknown mount option []. 07:42:32 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2402, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept(r1, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x80) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") 07:42:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1c5, 0x7000000) 07:42:32 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000010, 0x0) [ 673.163943] FAULT_INJECTION: forcing a failure. [ 673.163943] name failslab, interval 1, probability 0, space 0, times 0 [ 673.175272] CPU: 1 PID: 20398 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 673.183771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.193140] Call Trace: [ 673.195750] dump_stack+0x1c9/0x2b4 [ 673.199408] ? dump_stack_print_info.cold.2+0x52/0x52 [ 673.204651] ? graph_lock+0x170/0x170 [ 673.208485] should_fail.cold.4+0xa/0x11 [ 673.212572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 673.217694] ? print_usage_bug+0xc0/0xc0 [ 673.221789] ? graph_lock+0x170/0x170 [ 673.225628] ? find_held_lock+0x36/0x1c0 [ 673.229709] ? __lock_is_held+0xb5/0x140 [ 673.233809] ? check_same_owner+0x340/0x340 [ 673.238151] ? rcu_note_context_switch+0x680/0x680 [ 673.243124] __should_failslab+0x124/0x180 [ 673.247387] should_failslab+0x9/0x14 [ 673.251211] kmem_cache_alloc_node+0x256/0x720 [ 673.255805] __alloc_skb+0x119/0x770 [ 673.259527] ? skb_scrub_packet+0x490/0x490 07:42:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x2300000000000000}) [ 673.263876] ? find_held_lock+0x36/0x1c0 [ 673.267959] __ip6_append_data.isra.47+0x27a4/0x3600 [ 673.273088] ? lock_downgrade+0x8f0/0x8f0 [ 673.277259] ? kasan_check_read+0x11/0x20 [ 673.281432] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 673.286461] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 673.291162] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 673.295507] ? dst_output+0x180/0x180 [ 673.299335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.304892] ? ip6_setup_cork+0x120b/0x1ac0 [ 673.309235] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 673.314183] ? mark_held_locks+0xc9/0x160 [ 673.318394] ? __local_bh_enable_ip+0x161/0x230 [ 673.323089] ? __local_bh_enable_ip+0x161/0x230 [ 673.327781] ? lockdep_hardirqs_on+0x421/0x5c0 [ 673.332380] ? trace_hardirqs_on+0xbd/0x2c0 [ 673.336717] ? lock_release+0x9f0/0x9f0 [ 673.340711] ? lock_sock_nested+0xe7/0x120 [ 673.344962] ip6_append_data+0x1b4/0x2d0 [ 673.349041] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 673.354093] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 673.359125] rawv6_sendmsg+0x11cb/0x4720 [ 673.363215] ? rawv6_getsockopt+0x140/0x140 [ 673.367557] ? print_usage_bug+0xc0/0xc0 [ 673.371642] ? __lock_acquire+0x7fc/0x5020 [ 673.375893] ? graph_lock+0x170/0x170 [ 673.379703] ? print_usage_bug+0xc0/0xc0 [ 673.383770] ? mark_held_locks+0x160/0x160 [ 673.388023] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 673.393582] ? aa_label_sk_perm+0x45b/0x8d0 [ 673.397931] ? aa_profile_af_perm+0x430/0x430 [ 673.402440] ? find_held_lock+0x36/0x1c0 [ 673.406529] ? lock_downgrade+0x8f0/0x8f0 [ 673.410731] ? aa_af_perm+0x5a0/0x5a0 [ 673.414547] inet_sendmsg+0x1a1/0x690 [ 673.418362] ? rawv6_getsockopt+0x140/0x140 [ 673.422697] ? inet_sendmsg+0x1a1/0x690 [ 673.426690] ? ipip_gro_receive+0x100/0x100 [ 673.431027] ? apparmor_socket_sendmsg+0x29/0x30 [ 673.435801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.441348] ? security_socket_sendmsg+0x94/0xc0 [ 673.446130] ? ipip_gro_receive+0x100/0x100 [ 673.450466] sock_sendmsg+0xd5/0x120 [ 673.454192] ___sys_sendmsg+0x51d/0x930 [ 673.458179] ? graph_lock+0x170/0x170 07:42:32 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000880)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000140)=0x101) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000009c0)=ANY=[@ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="0400070000000000", @ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="d03a0cc6460c50a394a7b87b561fa2413772877130812e54f6b3e0587afcdc27f9a7d2990e52e90a4dcf74a8f1b9e591ac56d3414d8a6d9b09665d9764559370fa74ac7d31dc2c7e0b7071ab4cfbca6b322bd8c1236182007807f0f34dc1768f417171473344b7df5742e07e878d132279a4c737e86741ddf05f2fa9eec3c0e0a3b5226bfd82ff0048781fb483f63f0c38dba9e9b6440d6195b5ed44cdbaba11bb5300bfb9c6"], @ANYBLOB="09af090071ec03000300000003000000e5a63b5230f9ec9a042b697a042930fe"]) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x21, @dev={0xac, 0x14, 0x14, 0xf}, 0x4e24, 0x3, 'wlc\x00', 0x5, 0xc7a, 0x77}, 0x2c) syz_mount_image$bfs(&(0x7f00000006c0)='bfs\x00', &(0x7f0000000700)='./file0\x00', 0x8000, 0x0, &(0x7f0000000840), 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180)=0x3, 0x4) openat$nullb(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/nullb0\x00', 0x200100, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x30, r3, 0x200, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40840}, 0x20004000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f00000001c0)={{0x0, 0x6, 0x1, 0x9, '\x00', 0x3}, 0x1, [0x1, 0x80000001, 0xa9, 0x2, 0x1ff, 0xd1, 0x4883db9a, 0x7, 0x1, 0x4, 0x66a, 0x3, 0x8, 0x4, 0x7, 0x5, 0x6f, 0x8, 0x0, 0x7, 0x200, 0x7, 0x9, 0x7, 0x8d88, 0x8, 0x2, 0x100, 0xc98, 0x3, 0x7, 0x4e1, 0x6, 0xffffffff, 0xc46, 0xcc8, 0x1, 0x7fff, 0x6, 0x2, 0x9, 0x2000000000200, 0x2, 0x7, 0x80, 0x3233, 0x57b4, 0x7, 0x8, 0xffffffffffff8000, 0x7fff, 0x1ff, 0x8, 0x1, 0x3ff, 0xdd8, 0x283, 0xffffffff, 0x6, 0xffffffffffffffff, 0xfffffffffffffffc, 0x9, 0x6, 0x3, 0x8000000000, 0x5, 0x2, 0xffffffffffffffa5, 0x8000, 0xddb6, 0x2, 0x5, 0x1000, 0xe7f, 0x5, 0x8, 0xfffffffeffffffff, 0x5, 0x4, 0x1, 0xfffffffffffffff9, 0x100000001, 0x0, 0x100, 0x4, 0xfff, 0xfe8, 0xfff, 0x1f, 0xffffffffffffffff, 0x9f, 0x1, 0x6, 0x2, 0x1f, 0x4, 0x100000001, 0x1, 0x1000, 0x3, 0x5, 0x0, 0x71, 0x156f4aa5, 0x0, 0x8, 0xc53, 0x80000000, 0x7, 0x4, 0xfffffffffffffe00, 0xfffffffffffffff7, 0x1000, 0x0, 0x0, 0x5, 0x2, 0x1, 0x8, 0x2, 0x81, 0x401, 0x8, 0x40, 0x589, 0x400, 0x0, 0x10000], {0x0, 0x1c9c380}}) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x4) [ 673.461995] ? copy_msghdr_from_user+0x580/0x580 [ 673.466769] ? find_held_lock+0x36/0x1c0 [ 673.470850] ? lock_downgrade+0x8f0/0x8f0 [ 673.475021] ? rcu_note_context_switch+0x680/0x680 [ 673.479966] ? check_same_owner+0x340/0x340 [ 673.484317] __sys_sendmmsg+0x240/0x6f0 [ 673.488313] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 673.492646] ? __lock_is_held+0xb5/0x140 [ 673.496734] ? fput+0x130/0x1a0 [ 673.500028] ? do_syscall_64+0x9a/0x820 [ 673.504014] ? do_syscall_64+0x9a/0x820 [ 673.507996] ? lockdep_hardirqs_on+0x421/0x5c0 [ 673.512595] ? trace_hardirqs_on+0xbd/0x2c0 [ 673.516942] ? __ia32_sys_read+0xb0/0xb0 [ 673.521024] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.526407] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 673.531543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 673.537131] __x64_sys_sendmmsg+0x9d/0x100 [ 673.541394] do_syscall_64+0x1b9/0x820 [ 673.545295] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 673.550675] ? syscall_return_slowpath+0x5e0/0x5e0 [ 673.555626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 673.558191] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 673.560482] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 673.560504] ? prepare_exit_to_usermode+0x291/0x3b0 [ 673.560526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 673.560552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.560565] RIP: 0033:0x457099 [ 673.560582] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:42:33 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x74, 0x7000000) [ 673.560592] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 673.560616] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 673.560626] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 673.560635] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 673.560652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 673.560661] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000007 07:42:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2000]}}]}, 0x68}}, 0x0) 07:42:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="032f2df9c83d0df8a1a8e2b7953cdb4746"], 0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x800, 0x3) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000800)=ANY=[@ANYBLOB="020d0000100000008000000000000000030006000000000002000000e000000000000800120002000200682b352fd89da23c219592000000000000000030000000e90200000000000f00000000000000000000000000faffffff0600ffff1414bb000000000000080000000000000005000000000002000000e0000001000000000056b492000000b0454b96978f15262fbb6ce388149a662ab76d702e78621efb0af2038395802a89054cf043ac046dcb2fe9e188e689fdaa422c33e4253ef8ccafb10ad6754905b48e7d6658ec23000000005b631fa72380b5e3a9f63f2df83c75f3537cf3ca0f71bc6be4443a570398449391031d77ea6f14ae9f97323ef055c35dd47f28218a5e5683f3abc6fbb109d630b10961d2bbf6c0c402891ebef5f241b74891d5aaeb7ebba0c695e4af1c804f7ab4ff317231d2a463d455a4aae22bb1b71e51f087f6a3dc820cc19b9a39748fd1d0477e00a67ea232ab0740cb8d31861e8242d3712fc8c6d13fa44b2509e40fae79b4717c2979c1ae9f72ece05edee131601b862214a68ad382a01f3a9ec20091f31d6e5638e0b671298b70dd5a12784c071140d56d0154bb9fb01367c8a628fa28cfb58110bb2d8786b6ed789a231c1747a6a7af70c29c19e1385f1b24111cefdca020610c6805199c22df3004dedcf360d503f4a30df12e5f8f61b84971a7e455c112e80f8543e4b4f70ff87cdd158849d03cf8ce36b5eef61f06bd2dce31da5e91e4c809a29a3d78f64380a82cc8499b5deb2185bb73384adfe01f7f70def00ea63e56f92a26b1ebfe3a2e9196638d326b9431317144c0dd008f05e64eed7e7f0ad09682858e9172889be9a4b613832c1e1238ca9122a123f6850240c49bc468facf01aab71aa111602940469a56b7495860dd05bc66ecdb12704088c3a5167346dc8a698f9338b55013fb7bf9ec7b3f3df110780b9dcf796916fa1893fd9516516fd2c6982dfbb226c57cf0943cb6d578f48c8c39c8bb97e8210f49207757a58272c333a9f9ae2ac59f50effa08c700007b8d6980c2667b98b2fec9d0b9f4046f2d224f2022ec83ada069413defd9deec952c2fa42e231b76830923849faa5ccee4993b5f8b966c6d81ec27ea06eabd52bcd09b43d07856009758c4ae301331683d7b4f567511b9a79aa9553a74b03eac1f7156c78da869b15d44eb3e1dfa0074db89be"], 0x80}}, 0x0) 07:42:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5cc80700315f85715070c14fbf5582199c7ae2ed3a7c0590d7b84d97987e368042c1103ce307362b994306e216fc21edc6d59e166fcf3251e0d1792b699916d983ab5fad75c26722bc694cad77903cfbeafd27fc0ab242caa63d6bcc5511e7575ef44755f54ea5cac6f208b5a0130f2b2d5f10583b034c28011860f7fa13b4bbe5f74ddf626897c593666477587d240120bbb07a689e1416ab997b1582ade6ddb974b0c20a343ab4f2141146cb9f4fe82667a5e78ce428d93b8838ce0d035e01d47ec1957d60b2f8202c52f724a60a6526de6775547eee8824c30f2343c530d94443f4e1") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10001, 0x8002) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000040)=0x9, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:33 executing program 0 (fault-call:6 fault-nth:8): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 673.720155] XFS (loop3): Invalid superblock magic number 07:42:33 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000001b, 0x0) 07:42:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xec) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:33 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x2, 0x7000000) 07:42:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x400000000000000}) [ 673.920845] FAULT_INJECTION: forcing a failure. [ 673.920845] name failslab, interval 1, probability 0, space 0, times 0 [ 673.932226] CPU: 1 PID: 20472 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 673.940722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.950093] Call Trace: [ 673.952698] dump_stack+0x1c9/0x2b4 [ 673.956349] ? dump_stack_print_info.cold.2+0x52/0x52 [ 673.961558] ? graph_lock+0x170/0x170 [ 673.965389] should_fail.cold.4+0xa/0x11 07:42:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x34000]}}]}, 0x68}}, 0x0) [ 673.969483] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 673.974611] ? print_usage_bug+0xc0/0xc0 [ 673.978696] ? graph_lock+0x170/0x170 [ 673.982522] ? find_held_lock+0x36/0x1c0 [ 673.986611] ? __lock_is_held+0xb5/0x140 [ 673.990708] ? check_same_owner+0x340/0x340 [ 673.995048] ? rcu_note_context_switch+0x680/0x680 [ 674.000017] __should_failslab+0x124/0x180 [ 674.004275] should_failslab+0x9/0x14 [ 674.008109] kmem_cache_alloc_node+0x256/0x720 [ 674.012727] __alloc_skb+0x119/0x770 [ 674.016458] ? skb_scrub_packet+0x490/0x490 07:42:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 674.020813] ? find_held_lock+0x36/0x1c0 [ 674.024916] __ip6_append_data.isra.47+0x27a4/0x3600 [ 674.030039] ? lock_downgrade+0x8f0/0x8f0 [ 674.034223] ? kasan_check_read+0x11/0x20 [ 674.038407] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 674.043445] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 674.048177] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 674.052515] ? dst_output+0x180/0x180 [ 674.056345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.061904] ? ip6_setup_cork+0x120b/0x1ac0 [ 674.066250] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 674.071202] ? mark_held_locks+0xc9/0x160 [ 674.075380] ? __local_bh_enable_ip+0x161/0x230 [ 674.080073] ? __local_bh_enable_ip+0x161/0x230 [ 674.084771] ? lockdep_hardirqs_on+0x421/0x5c0 [ 674.089375] ? trace_hardirqs_on+0xbd/0x2c0 [ 674.093737] ? lock_release+0x9f0/0x9f0 [ 674.097725] ? lock_sock_nested+0xe7/0x120 [ 674.101981] ip6_append_data+0x1b4/0x2d0 [ 674.106063] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 674.111114] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 674.116143] rawv6_sendmsg+0x11cb/0x4720 07:42:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:33 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000000c, 0x0) [ 674.120228] ? rawv6_getsockopt+0x140/0x140 [ 674.124568] ? print_usage_bug+0xc0/0xc0 [ 674.128649] ? __lock_acquire+0x7fc/0x5020 [ 674.132901] ? graph_lock+0x170/0x170 [ 674.136708] ? print_usage_bug+0xc0/0xc0 [ 674.140777] ? mark_held_locks+0x160/0x160 [ 674.145025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.150577] ? aa_label_sk_perm+0x45b/0x8d0 [ 674.154925] ? aa_profile_af_perm+0x430/0x430 [ 674.159433] ? find_held_lock+0x36/0x1c0 [ 674.163515] ? lock_downgrade+0x8f0/0x8f0 [ 674.167690] ? aa_af_perm+0x5a0/0x5a0 [ 674.171512] inet_sendmsg+0x1a1/0x690 [ 674.175329] ? rawv6_getsockopt+0x140/0x140 [ 674.179662] ? inet_sendmsg+0x1a1/0x690 [ 674.183650] ? ipip_gro_receive+0x100/0x100 [ 674.187985] ? apparmor_socket_sendmsg+0x29/0x30 [ 674.192750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.198300] ? security_socket_sendmsg+0x94/0xc0 [ 674.203064] ? ipip_gro_receive+0x100/0x100 [ 674.207447] sock_sendmsg+0xd5/0x120 [ 674.211176] ___sys_sendmsg+0x51d/0x930 [ 674.215164] ? graph_lock+0x170/0x170 [ 674.218981] ? copy_msghdr_from_user+0x580/0x580 [ 674.223756] ? find_held_lock+0x36/0x1c0 [ 674.227838] ? lock_downgrade+0x8f0/0x8f0 [ 674.232013] ? rcu_note_context_switch+0x680/0x680 [ 674.236952] ? check_same_owner+0x340/0x340 [ 674.241299] __sys_sendmmsg+0x240/0x6f0 [ 674.245297] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 674.249633] ? __lock_is_held+0xb5/0x140 [ 674.253724] ? fput+0x130/0x1a0 [ 674.257017] ? do_syscall_64+0x9a/0x820 [ 674.261002] ? do_syscall_64+0x9a/0x820 [ 674.264986] ? lockdep_hardirqs_on+0x421/0x5c0 07:42:33 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000028, 0x0) [ 674.269587] ? trace_hardirqs_on+0xbd/0x2c0 [ 674.273917] ? __ia32_sys_read+0xb0/0xb0 [ 674.277987] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.283360] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 674.288483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.294040] __x64_sys_sendmmsg+0x9d/0x100 [ 674.298306] do_syscall_64+0x1b9/0x820 [ 674.302209] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 674.307588] ? syscall_return_slowpath+0x5e0/0x5e0 [ 674.312542] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 674.317583] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 674.322621] ? recalc_sigpending_tsk+0x180/0x180 [ 674.327388] ? kasan_check_write+0x14/0x20 [ 674.331647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 674.336507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.341703] RIP: 0033:0x457099 [ 674.344909] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.363832] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 07:42:33 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x103, 0x7000000) [ 674.371551] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 674.378829] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 674.386109] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 674.393385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 674.400658] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000008 07:42:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") pipe2(&(0x7f0000000140), 0x80000) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x1, 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x500) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f00000000c0)=""/39) 07:42:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2]}}]}, 0x68}}, 0x0) 07:42:33 executing program 0 (fault-call:6 fault-nth:9): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x111080, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 07:42:33 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x89, 0x7000000) 07:42:34 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000000b, 0x0) [ 674.620426] XFS (loop3): Invalid superblock magic number 07:42:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x40030000000000]}}]}, 0x68}}, 0x0) [ 674.749858] FAULT_INJECTION: forcing a failure. [ 674.749858] name failslab, interval 1, probability 0, space 0, times 0 [ 674.761542] CPU: 0 PID: 20546 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 674.770047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.779429] Call Trace: [ 674.782041] dump_stack+0x1c9/0x2b4 [ 674.785705] ? dump_stack_print_info.cold.2+0x52/0x52 [ 674.790921] should_fail.cold.4+0xa/0x11 [ 674.795006] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:42:34 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000001a, 0x0) 07:42:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x4c00000000000000}) 07:42:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x5b, 0x7000000) 07:42:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x3, 0x8a000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e24, 0x539b, @local, 0x1}, {0xa, 0x4e21, 0x4, @loopback, 0x243e}, 0x1, [0xe2e, 0x2, 0x100000000, 0x400, 0x2, 0xffffffff, 0x10001, 0x2]}, 0x5c) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:34 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000140)) 07:42:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100150000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000946ea1e0dd8b8db4a2da6af11a016c7446bf710052f1618a94c91741e37debdec48cbe05e76c8c1e675fe59788b9e211c84d336e831249830a36f727feb9f407aac7bb4a"], 0x80}}, 0x0) [ 674.800130] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 674.805087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 674.809877] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 674.815347] ? graph_lock+0x170/0x170 [ 674.819164] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 674.823941] ? retint_kernel+0x10/0x10 [ 674.827845] ? __lock_is_held+0xb5/0x140 [ 674.831940] ? check_same_owner+0x340/0x340 [ 674.836278] ? mark_held_locks+0xc9/0x160 [ 674.840464] ? rcu_note_context_switch+0x680/0x680 [ 674.845414] ? kmem_cache_alloc_node+0x217/0x720 [ 674.850173] __should_failslab+0x124/0x180 [ 674.854398] should_failslab+0x9/0x14 [ 674.858189] kmem_cache_alloc_node_trace+0x259/0x720 [ 674.863525] __kmalloc_node_track_caller+0x33/0x70 [ 674.868445] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 674.873203] __alloc_skb+0x155/0x770 [ 674.876922] ? lockdep_hardirqs_on+0x421/0x5c0 [ 674.881492] ? skb_scrub_packet+0x490/0x490 [ 674.885807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 674.890558] ? retint_kernel+0x10/0x10 [ 674.894441] ? __ip6_append_data.isra.47+0x761/0x3600 [ 674.899622] __ip6_append_data.isra.47+0x27a4/0x3600 [ 674.904753] ? lock_downgrade+0x8f0/0x8f0 [ 674.908907] ? kasan_check_read+0x11/0x20 [ 674.913058] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 674.918108] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 674.922766] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 674.927093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.932633] ? ip6_setup_cork+0x120b/0x1ac0 [ 674.936941] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 674.941860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 674.946620] ? retint_kernel+0x10/0x10 [ 674.950510] ip6_append_data+0x1b4/0x2d0 [ 674.954565] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 674.959571] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 674.964584] rawv6_sendmsg+0x11cb/0x4720 [ 674.968650] ? rawv6_getsockopt+0x140/0x140 [ 674.972959] ? find_held_lock+0x36/0x1c0 [ 674.977032] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 674.981799] ? lockdep_hardirqs_on+0x421/0x5c0 [ 674.986372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.991895] ? aa_label_sk_perm+0x45b/0x8d0 [ 674.996217] ? aa_profile_af_perm+0x430/0x430 [ 675.000716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 675.005469] ? aa_af_perm+0x5a0/0x5a0 [ 675.009274] inet_sendmsg+0x1a1/0x690 [ 675.013064] ? rawv6_getsockopt+0x140/0x140 [ 675.017395] ? inet_sendmsg+0x1a1/0x690 [ 675.021357] ? ipip_gro_receive+0x100/0x100 [ 675.025662] ? apparmor_socket_sendmsg+0x29/0x30 [ 675.030424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.035948] ? security_socket_sendmsg+0x94/0xc0 [ 675.040698] ? ipip_gro_receive+0x100/0x100 [ 675.045028] sock_sendmsg+0xd5/0x120 [ 675.048733] ___sys_sendmsg+0x51d/0x930 [ 675.052694] ? __switch_to_asm+0x34/0x70 [ 675.056744] ? __switch_to_asm+0x40/0x70 [ 675.060807] ? __switch_to_asm+0x34/0x70 [ 675.064866] ? copy_msghdr_from_user+0x580/0x580 [ 675.069623] ? __schedule+0x884/0x1df0 [ 675.073501] ? __sched_text_start+0x8/0x8 [ 675.077668] ? lock_downgrade+0x8f0/0x8f0 [ 675.081821] ? check_same_owner+0x340/0x340 [ 675.086154] __sys_sendmmsg+0x240/0x6f0 [ 675.090131] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 675.094440] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 675.099215] ? fput+0x130/0x1a0 [ 675.102508] ? do_syscall_64+0x9a/0x820 [ 675.106468] ? do_syscall_64+0x9a/0x820 [ 675.110441] ? lockdep_hardirqs_on+0x421/0x5c0 [ 675.115019] ? trace_hardirqs_on+0xbd/0x2c0 [ 675.119339] ? __ia32_sys_read+0xb0/0xb0 [ 675.123388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.128734] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 675.133823] __x64_sys_sendmmsg+0x9d/0x100 [ 675.138053] do_syscall_64+0x1b9/0x820 [ 675.141938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 675.147288] ? syscall_return_slowpath+0x5e0/0x5e0 [ 675.152213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 675.157055] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 675.162067] ? prepare_exit_to_usermode+0x291/0x3b0 [ 675.167089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 675.171944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.177125] RIP: 0033:0x457099 [ 675.180302] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.199186] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 675.206881] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 675.214135] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 675.221395] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 675.228660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 675.235914] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000009 07:42:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x200000000000000]}}]}, 0x68}}, 0x0) 07:42:34 executing program 0 (fault-call:6 fault-nth:10): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 675.437036] FAULT_INJECTION: forcing a failure. [ 675.437036] name failslab, interval 1, probability 0, space 0, times 0 [ 675.448719] CPU: 1 PID: 20595 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 675.457260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.466702] Call Trace: [ 675.469318] dump_stack+0x1c9/0x2b4 [ 675.472960] ? dump_stack_print_info.cold.2+0x52/0x52 [ 675.478165] ? graph_lock+0x170/0x170 [ 675.481997] should_fail.cold.4+0xa/0x11 07:42:34 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000019, 0x0) 07:42:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x400300]}}]}, 0x68}}, 0x0) 07:42:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xc6, 0x7000000) 07:42:34 executing program 6: r0 = socket$inet6(0xa, 0x800, 0x800000bc2) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x1c) flistxattr(r1, &(0x7f0000000240)=""/4096, 0x1000) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000240)={0x5, 0x3, 0x0, [{0xf20, 0xffff, 0x10001, 0x3, 0x1, 0x6, 0x2}, {0xa1, 0x7, 0x100000000, 0xdd89, 0x1, 0x9, 0x3}, {0x3f, 0x7, 0xaea, 0x4, 0x874a, 0xcdf, 0x7f}]}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x308ffc2c, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000002}, 0xfffffe2b, &(0x7f0000000140)={&(0x7f0000000340)={0xfc, r2, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xa5fc}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xd6d}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x10001}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8001}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ff}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4008040}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 675.486093] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 675.491246] ? print_usage_bug+0xc0/0xc0 [ 675.495333] ? graph_lock+0x170/0x170 [ 675.499160] ? find_held_lock+0x36/0x1c0 [ 675.503239] ? __lock_is_held+0xb5/0x140 [ 675.507332] ? check_same_owner+0x340/0x340 [ 675.511678] ? rcu_note_context_switch+0x680/0x680 [ 675.516653] __should_failslab+0x124/0x180 [ 675.520920] should_failslab+0x9/0x14 [ 675.524739] kmem_cache_alloc_node+0x256/0x720 [ 675.529348] __alloc_skb+0x119/0x770 [ 675.533094] ? skb_scrub_packet+0x490/0x490 07:42:35 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) listen(r1, 0x0) connect$vsock_stream(r1, &(0x7f0000000000), 0x10) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x157, 0x7000000) [ 675.537451] ? find_held_lock+0x36/0x1c0 [ 675.541542] __ip6_append_data.isra.47+0x27a4/0x3600 [ 675.546662] ? lock_downgrade+0x8f0/0x8f0 [ 675.550838] ? kasan_check_read+0x11/0x20 [ 675.555009] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 675.560048] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 675.564782] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 675.569143] ? dst_output+0x180/0x180 [ 675.572972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.578528] ? ip6_setup_cork+0x120b/0x1ac0 [ 675.582877] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 675.587820] ? mark_held_locks+0xc9/0x160 [ 675.591996] ? __local_bh_enable_ip+0x161/0x230 [ 675.596686] ? __local_bh_enable_ip+0x161/0x230 [ 675.598510] Unknown ioctl 19278 [ 675.601366] ? lockdep_hardirqs_on+0x421/0x5c0 [ 675.601387] ? trace_hardirqs_on+0xbd/0x2c0 [ 675.601404] ? lock_release+0x9f0/0x9f0 [ 675.601426] ? lock_sock_nested+0xe7/0x120 [ 675.601452] ip6_append_data+0x1b4/0x2d0 [ 675.625853] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 675.630915] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 675.635951] rawv6_sendmsg+0x11cb/0x4720 [ 675.640042] ? rawv6_getsockopt+0x140/0x140 [ 675.644391] ? print_usage_bug+0xc0/0xc0 [ 675.648466] ? __lock_acquire+0x7fc/0x5020 [ 675.652716] ? graph_lock+0x170/0x170 [ 675.656530] ? print_usage_bug+0xc0/0xc0 [ 675.658173] Unknown ioctl 19278 [ 675.660593] ? mark_held_locks+0x160/0x160 [ 675.660621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 675.660640] ? aa_label_sk_perm+0x45b/0x8d0 [ 675.660668] ? aa_profile_af_perm+0x430/0x430 [ 675.682490] ? find_held_lock+0x36/0x1c0 [ 675.686573] ? lock_downgrade+0x8f0/0x8f0 [ 675.690760] ? aa_af_perm+0x5a0/0x5a0 [ 675.694577] inet_sendmsg+0x1a1/0x690 [ 675.698400] ? rawv6_getsockopt+0x140/0x140 [ 675.702730] ? inet_sendmsg+0x1a1/0x690 [ 675.706718] ? ipip_gro_receive+0x100/0x100 [ 675.711053] ? apparmor_socket_sendmsg+0x29/0x30 [ 675.715830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.721379] ? security_socket_sendmsg+0x94/0xc0 [ 675.726151] ? ipip_gro_receive+0x100/0x100 [ 675.730647] sock_sendmsg+0xd5/0x120 [ 675.734374] ___sys_sendmsg+0x51d/0x930 [ 675.738355] ? graph_lock+0x170/0x170 [ 675.742173] ? copy_msghdr_from_user+0x580/0x580 [ 675.746945] ? find_held_lock+0x36/0x1c0 [ 675.751026] ? lock_downgrade+0x8f0/0x8f0 [ 675.755203] ? rcu_note_context_switch+0x680/0x680 [ 675.760141] ? check_same_owner+0x340/0x340 [ 675.764479] __sys_sendmmsg+0x240/0x6f0 [ 675.768474] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 675.772802] ? __lock_is_held+0xb5/0x140 [ 675.776896] ? fput+0x130/0x1a0 [ 675.780188] ? do_syscall_64+0x9a/0x820 [ 675.784179] ? do_syscall_64+0x9a/0x820 [ 675.788165] ? lockdep_hardirqs_on+0x421/0x5c0 [ 675.792762] ? trace_hardirqs_on+0xbd/0x2c0 [ 675.797110] ? __ia32_sys_read+0xb0/0xb0 [ 675.801184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.806591] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 675.811718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 675.817275] __x64_sys_sendmmsg+0x9d/0x100 [ 675.821530] do_syscall_64+0x1b9/0x820 [ 675.825435] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 675.830810] ? syscall_return_slowpath+0x5e0/0x5e0 [ 675.835759] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 675.840788] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 675.845812] ? recalc_sigpending_tsk+0x180/0x180 [ 675.850576] ? kasan_check_write+0x14/0x20 [ 675.854838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 675.859699] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.864894] RIP: 0033:0x457099 [ 675.868109] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:42:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x61, 0x7000000) 07:42:35 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000007, 0x0) [ 675.885897] XFS (loop3): Invalid superblock magic number [ 675.887012] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 675.887030] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 675.887040] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 675.887049] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 675.887059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 675.887069] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 000000000000000a 07:42:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfdfdffff00000000}) 07:42:35 executing program 0 (fault-call:6 fault-nth:11): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:35 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='nodevppp1\x00') 07:42:35 executing program 5: getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) r0 = socket(0x9, 0x0, 0x3c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = getpgrp(r1) r3 = syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/cgroup\x00') socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$key(0xf, 0x3, 0x2) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) connect$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) r6 = open(&(0x7f0000000240)='./file0\x00', 0x100, 0x17a) ioctl$UI_SET_PROPBIT(r6, 0x4004556e, 0x18) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="020d0010100000000000000000000000030006000000000002000000e0000001000000000000000008001200020002000000000000000003030000996d0000000f00000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e000000100000000000000000000008ed9d98893246dc4d519b74b1d86705ed57e7593188d3921aa192a0592f4570fbc7ee8a3e4c74d98e8e7725193b536e7feea10cb99db42733bbf3dfe73d99f517f3ee9120fa97d95ab63a536eba0216591f59d7319e1a51bddc8ec7504dcde816b8c58bf0e6c524461c02415b0014b243b052c498170b23bd56c8c676adf0bd0796c748220b50b207a72ec53a6b0bc22a3afdd7e267d90f09da937849801e8c7703b3064ba918375e33d03c50c55f6f06f8405"], 0x80}}, 0x0) 07:42:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x200000000000000]}}]}, 0x68}}, 0x0) 07:42:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r3, 0x9, 0x3}, 0x10) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:35 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000023, 0x0) 07:42:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x14a, 0x7000000) [ 676.237496] FAULT_INJECTION: forcing a failure. [ 676.237496] name failslab, interval 1, probability 0, space 0, times 0 [ 676.249519] CPU: 0 PID: 20662 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 676.258032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.267400] Call Trace: [ 676.270009] dump_stack+0x1c9/0x2b4 [ 676.273659] ? dump_stack_print_info.cold.2+0x52/0x52 [ 676.278887] should_fail.cold.4+0xa/0x11 [ 676.282975] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 676.288134] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 676.293098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 676.297884] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 676.303361] ? graph_lock+0x170/0x170 [ 676.307183] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 676.311995] ? retint_kernel+0x10/0x10 [ 676.315905] ? __lock_is_held+0xb5/0x140 [ 676.319998] ? check_same_owner+0x340/0x340 [ 676.324337] ? mark_held_locks+0xc9/0x160 [ 676.328510] ? rcu_note_context_switch+0x680/0x680 [ 676.333458] ? kmem_cache_alloc_node+0x217/0x720 [ 676.338242] __should_failslab+0x124/0x180 [ 676.342624] should_failslab+0x9/0x14 [ 676.346458] kmem_cache_alloc_node_trace+0x259/0x720 [ 676.351594] __kmalloc_node_track_caller+0x33/0x70 [ 676.356544] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 676.361329] __alloc_skb+0x155/0x770 [ 676.365066] ? skb_scrub_packet+0x490/0x490 [ 676.369451] ? find_held_lock+0x36/0x1c0 [ 676.373538] ? find_held_lock+0x36/0x1c0 [ 676.377632] __ip6_append_data.isra.47+0x27a4/0x3600 [ 676.382757] ? lock_downgrade+0x8f0/0x8f0 [ 676.386927] ? kasan_check_read+0x11/0x20 [ 676.391182] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 676.396223] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 676.400928] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 676.405302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.410852] ? ip6_setup_cork+0x120b/0x1ac0 [ 676.415200] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 676.420156] ? mark_held_locks+0xc9/0x160 [ 676.424323] ? __local_bh_enable_ip+0x161/0x230 [ 676.429006] ? __local_bh_enable_ip+0x161/0x230 [ 676.433694] ? lockdep_hardirqs_on+0x421/0x5c0 [ 676.438289] ? trace_hardirqs_on+0xbd/0x2c0 [ 676.442622] ? trace_hardirqs_on+0x2c0/0x2c0 [ 676.447037] ? lock_sock_nested+0xe7/0x120 [ 676.451293] ip6_append_data+0x1b4/0x2d0 [ 676.455366] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 676.460401] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 676.465433] rawv6_sendmsg+0x11cb/0x4720 [ 676.469522] ? rawv6_getsockopt+0x140/0x140 [ 676.473858] ? find_held_lock+0x36/0x1c0 [ 676.477940] ? lockdep_hardirqs_on+0x421/0x5c0 [ 676.482533] ? retint_kernel+0x10/0x10 [ 676.486439] ? graph_lock+0x170/0x170 [ 676.490245] ? print_usage_bug+0xc0/0xc0 [ 676.494320] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.499875] ? aa_label_sk_perm+0x45b/0x8d0 [ 676.504217] ? aa_profile_af_perm+0x430/0x430 [ 676.508724] ? find_held_lock+0x36/0x1c0 [ 676.512804] ? lock_downgrade+0x8f0/0x8f0 [ 676.516958] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 676.521742] ? aa_af_perm+0x5a0/0x5a0 [ 676.525559] inet_sendmsg+0x1a1/0x690 [ 676.529376] ? rawv6_getsockopt+0x140/0x140 [ 676.533704] ? inet_sendmsg+0x1a1/0x690 [ 676.537685] ? ipip_gro_receive+0x100/0x100 [ 676.542014] ? apparmor_socket_sendmsg+0x29/0x30 [ 676.546785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.552333] ? security_socket_sendmsg+0x94/0xc0 [ 676.557120] ? ipip_gro_receive+0x100/0x100 [ 676.561458] sock_sendmsg+0xd5/0x120 [ 676.565188] ___sys_sendmsg+0x51d/0x930 [ 676.569175] ? graph_lock+0x170/0x170 [ 676.572985] ? __switch_to_asm+0x34/0x70 [ 676.577064] ? copy_msghdr_from_user+0x580/0x580 [ 676.581846] ? __schedule+0x884/0x1df0 [ 676.585750] ? find_held_lock+0x36/0x1c0 [ 676.589831] ? lock_downgrade+0x8f0/0x8f0 [ 676.594001] ? rcu_note_context_switch+0x680/0x680 [ 676.598942] ? check_same_owner+0x340/0x340 [ 676.603279] __sys_sendmmsg+0x240/0x6f0 [ 676.607279] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 676.611618] ? __lock_is_held+0xb5/0x140 [ 676.615708] ? fput+0x130/0x1a0 [ 676.619005] ? do_syscall_64+0x9a/0x820 [ 676.622995] ? do_syscall_64+0x9a/0x820 [ 676.626984] ? lockdep_hardirqs_on+0x421/0x5c0 [ 676.631577] ? trace_hardirqs_on+0xbd/0x2c0 [ 676.635917] ? __ia32_sys_read+0xb0/0xb0 [ 676.639995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.645369] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 676.650490] __x64_sys_sendmmsg+0x9d/0x100 [ 676.654742] do_syscall_64+0x1b9/0x820 [ 676.658651] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 676.664033] ? syscall_return_slowpath+0x5e0/0x5e0 [ 676.668971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 676.673826] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 676.678860] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 676.683888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.689436] ? prepare_exit_to_usermode+0x291/0x3b0 [ 676.694463] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 676.699327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.704518] RIP: 0033:0x457099 [ 676.707721] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.726632] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 07:42:35 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r0, &(0x7f0000000300)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x800) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400000, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) sched_setattr(r4, &(0x7f00000002c0)={0x30, 0x0, 0x1, 0x8, 0x59fd, 0x2, 0x0, 0xfffffffffffffffe}, 0x0) getsockopt$inet6_int(r3, 0x29, 0xce, &(0x7f0000000000), &(0x7f0000000040)=0x4) signalfd(r0, &(0x7f0000000180), 0x8) 07:42:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x15e, 0x7000000) 07:42:35 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000008, 0x0) 07:42:35 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000200002, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5b83b3d473ebf56454b32f7d06899434fce85276b263", 0x16}, {&(0x7f0000000140)="6a8ffd3f7f8c4beb8cf983a27f92e46006d61c451d94839b59e381dca485db09e447a56668ce073acc851aed9fbaacbda499f49843786536c175049e387f8028a48a26d6350315b14ec2ec716e1d7f721eb62f585bec0a9cca1a18af8959745c2ea1e9fdec588bccf4863b9e530bf098ac24e7e875a9e76596218a1890b1798fb533c6657abcf6e4fb00953ee051ab94977634093b4219d3d8f131f9c5e935e66dfc2b7a0ed3963708878e4153fbde64ad9be423c934c7946aefa224e8fab0f456d958a69aa0e2d565736a", 0xcb}], 0x2) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$RTC_PIE_ON(r1, 0x7005) syz_open_dev$mouse(&(0x7f0000000800)='/dev/input/mouse#\x00', 0x7, 0x100) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') r3 = request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='/dev/snapshot\x00', 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000b40)={0x53, 0xffffffffffffffff, 0xd4, 0x80000000, @scatter={0x1, 0x0, &(0x7f0000000940)=[{&(0x7f0000000840)=""/253, 0xfd}]}, &(0x7f0000000980)="a5b963a164050e602abe0ac4b8acc99818d8cee9a8145878b0c9cb23d481a4efd05a66effee4ddb7cfce88526efee442651f31fc109deca268023f201a48e986380bad97bd6d3e6d5babb2f5c9b1c651f84ca8bda5ba82abdaf2d5c6217282875e384c1879503f15ccfa91b15785cc3b17c771f35ff03cac90462cc8263bb09ff7fd7198332f8cbcfef24f0a630f47a8916c018811fbe537d6048fa99d8cfac77c2f5e34696adb9519e7696f5f0bc211ef54a69f341d81911e462a3551f2f74cb224785f643df7d975b20381c1f1574d70da20f5", &(0x7f0000000a80)=""/65, 0x1, 0x20, 0x0, &(0x7f0000000b00)}) r4 = request_key(&(0x7f0000000740)='dns_resolver\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000007c0)='&{\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r3, &(0x7f00000006c0)=[{&(0x7f0000000300)="c26b5d0497caf89ccf598476eae4eeeec3bed94ecc8fb2fe13c2d931ac02615a60ed57c8c17071a1d3047b8c6ac0be55b47f379e9895bf55acd51ddee5fc222bee6f9c45026d6767be5c64c429045ed110257e3b9c572a49be8b2766e82b54b001e93ffbe37c38497e80c1e6aa586dbd5403b6ab1f4e6d0965e9c44eb4b23d094afd173f108be8f827a43cbdcfbf6e94c5dab0146117bc0e4bb9fa4f2ed165249999be5cc0f181e126f155547e26d4180da101c1afba670ca0185ec77af536446538da00349366ec34c8aa09b592077d1ca86e7abb486a3636d2f35b8bab25d9bdbb3fb680e8beef784ab73b4bb6", 0xee}, {&(0x7f0000000400)="e18cd5d8d120d77c3646f5d9c925394e00ebed9a4afdc5248fe7a925cd352ce352a2fa6d790f738406cb51b487af8f7fa84ca0d1fb455416d2d9c653be71f887b8e95814606fe7a61ad96bec87570785f9530816f9a16d144f36e18f03c7b84249f3501975595dcc131093422f8ef2050d0dd0b24ebbc86489f6b76327abe1fced76387f85fbca2ddf8697", 0x8b}, {&(0x7f00000004c0)="0140ef5d992dfcf3f2e46fce0bf31a1a0b1085ca9d5afe2aa3a5e449d6b16802e7f9fb9b2519ff503c8e745d8475050669394be78049315f9f61980f0c83d782c022a96c1cd95e44c180fc46ffb178e18fd0322d603cd3e771ddcd74cef09e07b165823f8f04d3d81cb0c6882622f025e1cfa1b640", 0x75}, {&(0x7f0000000540)="109a0de12d6f54f2906e5fb97e06d197090c63a3432154d8f8cf8508737cdc9df8a3883d838d489769f378bd919d92610924795da4aa5a215072550dbf0b976ee3dd9533085585b586cb0740df45fa039ac72666d98b4a5861262b7c09c3c4aa726159d99b18caf189249f4d8a1a121229b6518afa78311e51b1df5cd960654dce8a3ebaa2b9c5820cce53b537a9f127cecea96bf158c1462981788df62fec51a0c7024db3071645097badcacc0bc265e9ff09a972da1039120c7837387c43480ec7b6da46b0cab6", 0xc8}, {&(0x7f0000000640)="46cbfc817bde1f227fba64f194d7c4d8558b6b4667a9ab454bfbb1ee812b8de8713dec24cc0e161a8a448d5e32cd8b1596a0a7c1e224d5aa16b7f78815be7b8efe7631cda0ef01ef616053446c0031702069386edd37226a2a1d3857983d31aa863d07e2c9d2c04e91f31695c5b31262f278d907c898dc17", 0x78}], 0x5, r4) 07:42:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x400300]}}]}, 0x68}}, 0x0) 07:42:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x55, 0x7000000) 07:42:35 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000000d, 0x0) 07:42:35 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0x7fb) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") write$P9_RLERRORu(r0, &(0x7f00000001c0)={0x18, 0x7, 0x1, {{0xb, "657468309f766d6e657431"}, 0xff}}, 0x18) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f0000000000)=0x6e) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 676.734842] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 676.742126] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 676.749402] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 676.756680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 676.763959] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 000000000000000b [ 676.868794] XFS (loop3): Invalid superblock magic number 07:42:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd00}) 07:42:36 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000017, 0x0) 07:42:36 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') flistxattr(r0, &(0x7f0000000140)=""/249, 0xf9) 07:42:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x143, 0x7000000) 07:42:36 executing program 0 (fault-call:6 fault-nth:12): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = open(&(0x7f0000000000)='./file0\x00', 0x101480, 0x48) r2 = socket$inet6(0xa, 0x1, 0x0) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000040)}, &(0x7f0000000100)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000140)) setsockopt$inet6_buf(r2, 0x29, 0x80000000000040, &(0x7f0000000080), 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0xffffffffffffffff) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 07:42:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socketpair$inet6(0xa, 0x7, 0x5, &(0x7f00000000c0)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x18a00, 0x98) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000040)=0xb2) socket$inet(0x2, 0x5, 0x2) 07:42:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2000000]}}]}, 0x68}}, 0x0) [ 676.930075] XFS (loop3): Invalid superblock magic number 07:42:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xffffff7f]}}]}, 0x68}}, 0x0) [ 677.070050] FAULT_INJECTION: forcing a failure. [ 677.070050] name failslab, interval 1, probability 0, space 0, times 0 [ 677.081630] CPU: 0 PID: 20750 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 677.090156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.099521] Call Trace: [ 677.102136] dump_stack+0x1c9/0x2b4 [ 677.105788] ? dump_stack_print_info.cold.2+0x52/0x52 [ 677.111008] should_fail.cold.4+0xa/0x11 [ 677.115108] ? __kernel_text_address+0xd/0x40 07:42:36 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000004a00)={0x0, 0x100}, &(0x7f0000004a40)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000004a80)={r2, 0x1, 0x7, 0x1, 0x4000000000000, 0x8001}, 0x14) sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="18a16fd9ff004e662d58555bd5763f7b24918ea100c67b9cd2cb4ce6a253a4ff5fb8f4e806c4277379df57730645c7512f0bc824708b2307cc60d6cbadc968ff29f8402f25daa37f641cca17457451e19df7e6dd", 0x54}, {&(0x7f00000001c0)="2a78abe0c4ebd140ccf199b82ed6fa23751b3480ee342d917f382325ed60dc105670168540b065b9c28b0f51c87f92480e918a952db8dbfdb2a88d77bcc4797de832e4250cb4c94c4011313f16fd0fc1e575761dcc8283e4ff9565554b2bb72ccb532bfe6e5819e2ed1e4858951c82ae119024502678740110b73205f4684506c2c7034a9d7e35b9c25cfd437ceabe5825c58c3ede5eb4b19fa9c84e0737a7fbf160c050c1fa2d32b2759a739048b1c366810fc30dbd2748cff90771ca3feeff32", 0xc1}, {&(0x7f00000002c0)="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", 0x1000}], 0x3, &(0x7f00000012c0)=[{0x1010, 0x104, 0x8, "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"}, {0xe0, 0x100, 0x7, "bd1091fafa5797eee9761135b0834a7d60210087a4dae4a66cf1553d743b09f8b16659e08f80de08900ff5ab70dd4ba2fcdcb8278fa349b76cbc7c2a8b8d42f4ed5592e52f8c34c155803112bc77f052460751e3b778e32d0596976d9046cf3c422c8ee16a9e30c4c76b331e7d7cfc8a4f831a930f30e7b07671a4938001c89c57ba08cf3cea77c7f87fcc45655e0d7b1da19dffd261fe123afcbb3639d8f08ee28edc04590cedacdf73a95b2a69d7a4452de6ebefdc9fb8f2ff2b664d518d3916eebb851aa36a8183efb15c42"}, {0xb0, 0x196, 0x4, "a8fbb3ba3b8dc8fc18437fbf92f5706ebec60f3ab0925b9586d2d01ecb3dec4a5bb928892fe0364160fc4f0cfe3e7ee5cf8bef8c9012be00c82d3030d7d12facf1f5401d993700d69fcf5eea55a7bcc7316a8eac78deb56da1455215693bf7c02db4c5cd56fa41d043eadc16736534f1d054e199a938b80b9131e6b5651a6f5f925ad8d9461982b94a14f0f21357cb7dfb02de5d850c25b586e908b1c1b715"}], 0x11a0, 0x10}, 0x8}, {{&(0x7f0000002480)=@llc={0x1a, 0x325, 0x400, 0x7, 0x2df9, 0x101, @broadcast}, 0x80, &(0x7f0000002800)=[{&(0x7f0000002500)="35d81c187e7aac4075472d1ffab63645a6cfa20d4f701b4dd712b96e3e40fcc6fc0a126e2e4e4e154bad334d570636862e6b48f8aafd03f2b0fc13e561bddb55aef40d66b7b99a095cf97ccc8b55ab1a87ee9c394963446fbe0883809a9ca0ae19e5984f7eb2e2a4aa52711749cbf4285612c5aa0579b67b623708ceffafc9f4135e928d80e9dac557d947252a69f9672701a9f5cffa4b05a4e6c2193fddbe46b5877a15073b14ab728379f30799b5987e1d7691e071f4168a6666484a068c887da44f90809542dd2356a73b8341efefd4987f4920ba6f3de75636727f951669e7ba52c70b8325063a471cce19feef87802828", 0xf3}, {&(0x7f0000002600)="f7fad75940250bc72167e5dfedca1e2482d26fc9fef6ec8ed507d762ddb2afeb0bf310b18a59aedb21d5766a960d416eed984962613d89d14f2caead818413c2cf50dde805ed55274221fef663c7c4f06262ff2b1ab48261903d54c12f0921eef272faeadb0aa98faeb80834cd0fe2a48ead46624eb066868b7d4dd1d7987be4003432e3685fd3cfe59893d895b45b61bcce11a3f67cb79374e07a8fb431357b9d9400e5a1433d6de8b9fa1d7218b4950a85b6364258a011aedd11f374c570c0639dda52babb5404e9c296bd9c5c616b6181a79d2467117736bc604ed3fb8276d560775b", 0xe4}, {&(0x7f0000002700)="539fda447c54477b8b481bb6c60ca314c5e72cd322b112f4bf49f35c3488ed1103da06fbe65c1abccbc591a410124cb73cadd7cd004e4c5d78fc5c19894cb841007ec81b2e2e5baeb2c969781dd73fe097e4d3972d7f6ec2695d92b93bc3379d6d09c0e9dda73aef805734a3ad61e7df31d860b948e3758d1f6fd91aefc6c5d31154c51570daad84cd2f68b9270ad6c1e0d55587aa411d80fef266bf00d08df1624c8887604006e7c9fa4ce16631c0660a551404dcd13fb15f536ccb2489583993e923d487f56cebcf85f98e7db12d99e98870a79656bb7cf804", 0xda}, {&(0x7f00000000c0)="b6dcf440bfc7c2aa43f27853650ef04b6a0386492d40d45c67a2d518e6c3b8af6b2316da6b4a1bf3db54e45c3b2d39be8182e7d4bac7dbee72", 0x39}], 0x4, &(0x7f0000002840)=ANY=[@ANYBLOB="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"], 0x178}, 0x200}, {{&(0x7f00000029c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x0, 0x4, 0x3, {0xa, 0x4e22, 0x20, @empty, 0x2}}}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000002a40)="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", 0x1000}, {&(0x7f0000003a40)="fae506d26c85613220d36b01f125aa8d4e5723424c89a0b1cddc6a59127afddd0f376a635996a57bd8ff4891b072de84a653c69ccbf8f50b726e402265211cbdc7c1f031dc16fd1aa65e99cb40cd38e573ddb1c218aa68a7bf70c8cfe552b113f6d31b10a0219ce32ed435d87a59938c53cdf8e4", 0x74}, {&(0x7f0000003ac0)='xk', 0x2}, {&(0x7f0000003b00)="f2e134ee215492f75238079cc15e72346df1a52cbba53e13eeb577ed488c5cb97a470b1462f915185502540fdd116279fd078733a67c76870f45396e94e0538ea6d0ea719e1e5807391032571976ef4f87ce5b94b15c82761ae23b6d", 0x5c}, {&(0x7f0000003b80)="2aaae56cfc25eeb119e182d8a2f518c4ff290a9ad15e1e2e413bd8a51a3f1590dc7ddad7dbf2950f5fde18f44b45d25026808511b9b23fdd953d2e77a43c5ec7d62b7820d42b3779a84bccacdd8ebfba71bb0ead6f70fc1753cfdbd7fbff195cb1c7dea12df894d7e89a39c6", 0x6c}], 0x5, &(0x7f0000003c80)=[{0x70, 0x111, 0x7f, "bf95e577938a611ad0bdc4b04b5d88e122bc0c90f910fc07efa54f717ecf4757a1937e3a8f02b30a3e0ee28bc3d6226b99b69d51c65aab072a9f43cdd22dcb49f7c5ee372208643e3ae7de57196cda8ae090689eb37472b869ba69e0"}, {0x50, 0x105, 0x7, "8e48e4002eb296b81e9fa9ffba2ec2056ad7ee1ffa225a892be3358437e89118a0018e6af9e73b62a182d4de0cf33b0b744a956bf22dc9f28e4560"}, {0x100, 0x10c, 0x9, "74c00b6d350d88741885ace8751b34c5b7a1c2911fcfefc201f6f320df442c4cf3b176d6692821755e753718ce60fc0c22bf41c1582e10f4ec059baa11fdd459205a7d3bfab9accc96a99b08d2beaa2d653131dc297f8ca218abf73d059f0dd797504574737c9200e669b834ef6928e006fcd4fd39aefe2765a3740dd917270fb3cb1474c32fa0dc10ea01e037b091d47f56bccc2edd08f7bfb7e87668ceec8f74a9e92ae5ef555eb978ef414ab21799a170c4d5814a51583784062585af3cd67a8032ca383c75a9924a3fc6c7e116dde56eb498308936a15cac10f6f48c2b81164c5a6125ed42a7b9a4d936"}, {0xa8, 0x1, 0xc1aca3, "863a471fd644aa84482f1e016b57c236329be1e578b38274840645dccaeddc02be56965a143a8cccf1b1f4e83845de1188c54eb491a1afc20d94b2443fdb8da0095ba414f34fad2604421a644e47d5f41510357b701b039a5b3223553acf3da8138472e4c453ba8c444a25286f52dcc9993109f6b7deeb6cd57fbc19b0db59d612e2d9081aa1a28952c980dac76eb99820b2217d49133e"}, {0xe0, 0x11f, 0x0, "a30e2f4468bc1a908366d21067e163488c9f3a93d04f86ea46ea7ad5cdf143d90a110876c7e4fff8a5f73e56e15248810e142afeae5449c88a6bcbbbaf3894fd4904d5c4a1a0bc901f32e7278868b657172193cff8544417a359ebdc7ac9c20918702c3afee6eac12793e052ade40bf8f3b0da4024bbb29d3dbf752527a8686d2a2aca78e1350a3d24e485c9a80bc5c4c06e493334ae267addd81dbd7cc7a2a1654f43fb9a96fe703634191ee880db14d0eeaa5f41dbf0f6d05fc40a7c694ec7e26c885c90c4a6c868"}, {0xa0, 0x0, 0x1, "18890a5b4fd569f4173153d2bcb9104d2303d29de3abe8e53a253acf0e2bb03a0527c462cb1421afebbb5abe33cbc41f51a33399e1bda1a51c8edea728e09b62b95daa9aeef6ba03f2742913d9a04e2bad112a2094fb5ec37c7bbc36aa78c8743ae87dc4b9fc3254f565bb85c6565b253c3ab27968bd8bb90ca7cb9a3a7535fa96aa43f85d88befc3adfe64050"}, {0xa8, 0x0, 0xff, "ae4995f2b90354cb87c5dc6faabf4371e4398a31eb317ea2edb0baa4ed7cd67a341fb872e82e350b40a75e4fe9a36eae1b2725541bbbb94c9aca49800988a0cb1ac57621a0d8e6c0f60f798134b1c020424ab66fbb2333a63255e48a0b0ef73cb78740ae0530ad5b1f0bd115caeca5321dbbb1a719ec560dc7a555fc0d43bda13af543dc980a6da1efd2c6e03195f028c1c8c5"}], 0x490, 0x880}, 0x100}, {{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000004140)="3b543e8fcc0413dc755937f22b9ac45fb573e9eee4131e2a55ce3dc244e297050a987eff9f51150e9ed652ce188480e315dc71cf", 0x34}, {&(0x7f0000004180)="f9c3aefedc37e8d3a5397b9d3520542e4e020a35a363de84653eff675d89e0ee900da2c04988ddccfb7add72ca8d835977687c3bd9cbc4155c414faadb6850b681c8c68bd2b3f946a8a19b05036d78e8a235e4574d6f31330ad0e2481ae009d555d5a38fdcac33dc4d1b921f8e97ade18ba7948e392ab94912fbf5f663425b44a173ef2fc268aed30de65710962749cd6d61de30a91b305a78d40140db52efd02afcc6c6766bd95a9f40fb547b77eb1bdb5eb6bce57efd5ab19d8969c55168ca0946a948a158fba1ea03cc8f3ebf75453c7a732afe37b2", 0xd7}, {&(0x7f0000004280)="cc18e4583435f28a5d1d8cef2428dde9c0cf39c44e08355ca9a1f97b5430ba09dc3562ab88374f33d8a660f9c9be860bd93e3de3afeac3b51e6d32a7fb0724486d147ef3c2fa4adde1b15d84fe403ec2e99a555344e3e00536b59aead708790ca4fe07c6eb47d6f224b2e55194384f44be1464d89aa5ace7834b52280e1f82e253156ec1f832f44a017f92c2a52ccab513", 0x91}, {&(0x7f0000004340)="9f061035bce4e0096d1aea705f355dfe94408fd53d86483c7e84d1d8d765a12285cd29dbfd211af3e650c0bea1fcfe13fec4018c1a5118d8513c9b1f32512a7ec19eec52221be2322526f46a8a7c5e0317b636a0d5d85dbe64be50c0160a9d7611890c54fd1804c48ba2d43fe7569a4cb7b1fcc4bb21302ee50df5da62e1e3d0fd6653ad3c0436794532f0833ebcdd7c82ef432b9f863904e9f61f8dd0bd67f79cb1", 0xa2}], 0x4, &(0x7f0000004440)=[{0xb8, 0x115, 0x9, "e3225b1fe184648d3d9bef30437986fde083079e6fa414d4dcf8495ef5b2acd77f69726f38af43f9f97c82dc12118ba49e59dbf9e5ad44f2cb6ad2774d2cb68da29eb094695be660833afbb359fd808936c2ef4634ff7fa4e270470a6bc91c706485913013b2f5066dbdd56894c8e329c2e1570ca90b1016520c51dac52183b2cdf1d90795f067cfd413398ef25bc3a46976fba0fae6e467c04a0c5b0c7e684d3133"}], 0xb8}, 0x800}, {{&(0x7f0000004500)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'ip6_vti0\x00'}}, 0x80, &(0x7f0000004680)=[{&(0x7f0000004580)="b77a4df9bbb3fcfc83bf80b39799892c507e7ee4192413dbf4643d60895de1f61b3e34d2a128631974b27010d3e573ecd7ba33c8985d4ef9e88504375e9a94a8f6950ed0c1a6", 0x46}, {&(0x7f0000004600)="9a74cdb5247014c897615868989954ae62c5f071bec20f926b5515b8f929ccc1a1c301202647b581e59bcd72a8cbe1503d744eac3ce6ef46ed5026902a2dbe54a5ec94285882276af4715288734987c918087f4220fbc612ff7cf8bc3a2316b0", 0x60}], 0x2, &(0x7f00000046c0)=[{0x80, 0x113, 0x9, "71354a688ff144c54e7539c6eaefad282effcdbef668e644a11f8435e78b689785ef193bb9f8e333bc714570316662a8f0ebfb65762a6576d6111f590df0d039654c3074c207352ff9e2a1bde717a84c74789a50774b819bd95091ac589cd3c6e58efa1e9db2660457"}, {0xc8, 0x104, 0x1, "2d2c0d3d8e9d247d144845bcf5708e7a853456e59536c850fd6835be4b7ecefe24d1464369f5af5babb3940c2059cefaf5b9655e006f8a64576b63e4180a655c5475df91aafd669925f1753c527c0ba765d0f81a093411a986725f621dbdb5d36b688a415e45ccc9b6adaee5ecd8884226db26b926017191dcc94d16cc7169f7ae1406b4f7af859982c4f38283972bde38eb8dd4723fa637782ce3db3718a1217944610c7321d85f00dd6544caa70ddc43"}, {0x98, 0x0, 0x7fffffff, "3bfc00e0d579bff4f4968cb9f1cfa6f455a8ddef6aa048e77170e1a02d90be9381014d184137e180dc9ec4c1c5cb7fc86fb5f58089b1a2849d5c61fad344794a76db5cd5f5caf3b1ecf5f6b31bce92c68d1da2019595ed5849eaa9a2e5617979110ce41e5c83fc6cf4077950da167c41a2eedc992e33d45d4be0aff61225018dc8d456cb7eb4"}], 0x1e0, 0x1}, 0x6}], 0x5, 0x40) [ 677.119627] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 677.124755] ? __save_stack_trace+0x8d/0xf0 [ 677.129125] ? graph_lock+0x170/0x170 [ 677.132947] ? save_stack+0x43/0xd0 [ 677.136587] ? kasan_kmalloc+0xc4/0xe0 [ 677.140497] ? find_held_lock+0x36/0x1c0 [ 677.144588] ? __lock_is_held+0xb5/0x140 [ 677.148684] ? check_same_owner+0x340/0x340 [ 677.153019] ? mark_held_locks+0xc9/0x160 [ 677.157186] ? rcu_note_context_switch+0x680/0x680 [ 677.162142] ? kmem_cache_alloc_node+0x217/0x720 07:42:36 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000000000000, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:36 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") write$FUSE_DIRENT(r0, &(0x7f0000000140)={0xd8, 0x0, 0x1, [{0x5, 0x7, 0x5, 0xfffffffffffffffa, 'fd/3\x00'}, {0x4, 0x0, 0xd, 0x2, 'security^&em1'}, {0x0, 0x80, 0x4, 0xfffffffffffffffd, '@\\\':'}, {0x5, 0x9, 0xe, 0xdf, '/dev/snapshot\x00'}, {0x2, 0x1, 0x0, 0x9}, {0x6, 0x0, 0x6, 0x0, "b8262b40a640"}]}, 0xd8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x1, 0x0, 0xff, 0xf, 0x5, 0x99, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:36 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101802, 0x0) mount$9p_xen(&(0x7f00000000c0)='/proc/self/net/pfkey\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x40, &(0x7f00000001c0)={'trans=xen,', {[{@access_user='access=user'}, {@nodevmap='nodevmap'}, {@version_u='version=9p2000.u'}, {@aname={'aname'}}]}}) [ 677.166928] __should_failslab+0x124/0x180 [ 677.171199] should_failslab+0x9/0x14 [ 677.175023] kmem_cache_alloc_node_trace+0x259/0x720 [ 677.180175] __kmalloc_node_track_caller+0x33/0x70 [ 677.185169] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 677.189944] __alloc_skb+0x155/0x770 [ 677.193680] ? skb_scrub_packet+0x490/0x490 [ 677.198023] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 677.202797] ? retint_kernel+0x10/0x10 [ 677.206714] ? __ip6_append_data.isra.47+0x14bd/0x3600 [ 677.212009] __ip6_append_data.isra.47+0x27a4/0x3600 [ 677.217132] ? lock_downgrade+0x8f0/0x8f0 [ 677.221305] ? kasan_check_read+0x11/0x20 [ 677.225481] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 677.230518] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 677.235220] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 677.239559] ? ip6_dst_ifdown+0x4e0/0x4e0 [ 677.243723] ? ip6_setup_cork+0x1486/0x1ac0 [ 677.248061] ? ip6_mtu+0x14/0x520 [ 677.251551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.257123] ? ip6_setup_cork+0x120b/0x1ac0 [ 677.261465] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 677.266405] ? mark_held_locks+0xc9/0x160 [ 677.270567] ? __local_bh_enable_ip+0x161/0x230 [ 677.275241] ? __local_bh_enable_ip+0x161/0x230 [ 677.279916] ? lockdep_hardirqs_on+0x421/0x5c0 [ 677.284594] ? trace_hardirqs_on+0xbd/0x2c0 [ 677.288927] ? lock_release+0x9f0/0x9f0 [ 677.292917] ? lock_sock_nested+0xe7/0x120 [ 677.297168] ip6_append_data+0x1b4/0x2d0 [ 677.301246] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 677.306282] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 677.311326] rawv6_sendmsg+0x11cb/0x4720 [ 677.315415] ? rawv6_getsockopt+0x140/0x140 [ 677.319752] ? find_held_lock+0x36/0x1c0 [ 677.323834] ? graph_lock+0x170/0x170 [ 677.327643] ? kasan_check_read+0x11/0x20 [ 677.331804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 677.337350] ? aa_label_sk_perm+0x45b/0x8d0 [ 677.341685] ? aa_profile_af_perm+0x430/0x430 [ 677.346190] ? lockdep_hardirqs_on+0x421/0x5c0 [ 677.350783] ? find_held_lock+0x36/0x1c0 [ 677.354860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 677.359663] ? aa_af_perm+0x5a0/0x5a0 [ 677.363480] ? copy_user_generic_unrolled+0x89/0xc0 07:42:36 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000000)={0x30, 0x0, 0x7, [{0x2, 0x46e, 0x5, 0x6, 'fd/3\x00'}]}, 0x30) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 677.368514] inet_sendmsg+0x1a1/0x690 [ 677.372333] ? rawv6_getsockopt+0x140/0x140 [ 677.376661] ? inet_sendmsg+0x1a1/0x690 [ 677.380647] ? ipip_gro_receive+0x100/0x100 [ 677.384981] ? apparmor_socket_sendmsg+0x29/0x30 [ 677.389747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.395300] ? security_socket_sendmsg+0x94/0xc0 [ 677.400069] ? ipip_gro_receive+0x100/0x100 [ 677.404419] sock_sendmsg+0xd5/0x120 [ 677.408142] ___sys_sendmsg+0x51d/0x930 [ 677.412133] ? __switch_to_asm+0x34/0x70 [ 677.416204] ? __switch_to_asm+0x40/0x70 [ 677.420277] ? __switch_to_asm+0x34/0x70 [ 677.424353] ? copy_msghdr_from_user+0x580/0x580 [ 677.429133] ? __schedule+0x884/0x1df0 [ 677.433035] ? __sched_text_start+0x8/0x8 [ 677.437204] ? lock_downgrade+0x8f0/0x8f0 [ 677.441371] ? __sched_text_start+0x8/0x8 [ 677.445539] ? check_same_owner+0x340/0x340 [ 677.449880] __sys_sendmmsg+0x240/0x6f0 [ 677.453873] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 677.458212] ? schedule+0xfb/0x450 [ 677.461764] ? __schedule+0x1df0/0x1df0 [ 677.465756] ? do_syscall_64+0x6be/0x820 07:42:36 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in=@local}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000240)=0x4) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 677.469825] ? trace_hardirqs_on+0x2c0/0x2c0 [ 677.474244] ? fput+0x130/0x1a0 [ 677.477540] ? do_syscall_64+0x9a/0x820 [ 677.481526] ? do_syscall_64+0x9a/0x820 [ 677.485513] ? lockdep_hardirqs_on+0x421/0x5c0 [ 677.490124] ? trace_hardirqs_on+0xbd/0x2c0 [ 677.494456] ? exit_to_usermode_loop+0x1f4/0x380 [ 677.499233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.504606] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 677.509725] __x64_sys_sendmmsg+0x9d/0x100 [ 677.513981] do_syscall_64+0x1b9/0x820 07:42:36 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x3ff, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 677.517885] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 677.523263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 677.528203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 677.533056] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 677.538133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.543683] ? prepare_exit_to_usermode+0x291/0x3b0 [ 677.548714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 677.553577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.558772] RIP: 0033:0x457099 [ 677.561976] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 677.580890] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 677.588612] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 677.595882] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 677.603159] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 677.610432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 677.617706] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 000000000000000c [ 677.687132] XFS (loop3): Invalid superblock magic number 07:42:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x803000000000000}) 07:42:37 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') recvfrom$inet6(r1, &(0x7f0000000140)=""/91, 0x5b, 0x2, &(0x7f0000000000)={0xa, 0x4e21, 0x3, @remote, 0xffffffffffffaeb6}, 0x1c) 07:42:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x7, 0x7000000) 07:42:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/keycreate\x00') ioctl$VT_WAITACTIVE(r2, 0x5607) 07:42:37 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000000a, 0x0) 07:42:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x34000]}}]}, 0x68}}, 0x0) 07:42:37 executing program 0 (fault-call:6 fault-nth:13): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") lseek(r0, 0x0, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001000000000001b00000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e0000001000000000000000000"], 0x80}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x44000) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x800, 0x4) [ 677.829867] FAULT_INJECTION: forcing a failure. [ 677.829867] name failslab, interval 1, probability 0, space 0, times 0 [ 677.841214] CPU: 1 PID: 20838 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 677.849715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.859075] Call Trace: [ 677.861692] dump_stack+0x1c9/0x2b4 [ 677.865342] ? dump_stack_print_info.cold.2+0x52/0x52 [ 677.870560] should_fail.cold.4+0xa/0x11 [ 677.874645] ? __kernel_text_address+0xd/0x40 [ 677.879160] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 677.884286] ? __save_stack_trace+0x8d/0xf0 [ 677.888646] ? graph_lock+0x170/0x170 [ 677.892465] ? save_stack+0x43/0xd0 [ 677.896115] ? kasan_kmalloc+0xc4/0xe0 [ 677.900020] ? find_held_lock+0x36/0x1c0 [ 677.904114] ? __lock_is_held+0xb5/0x140 [ 677.908206] ? check_same_owner+0x340/0x340 [ 677.912536] ? mark_held_locks+0xc9/0x160 [ 677.916701] ? rcu_note_context_switch+0x680/0x680 [ 677.921644] ? kmem_cache_alloc_node+0x217/0x720 07:42:37 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000004, 0x0) 07:42:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1bc, 0x7000000) [ 677.926426] __should_failslab+0x124/0x180 [ 677.930679] should_failslab+0x9/0x14 [ 677.934497] kmem_cache_alloc_node_trace+0x259/0x720 [ 677.939639] __kmalloc_node_track_caller+0x33/0x70 [ 677.944593] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 677.949383] __alloc_skb+0x155/0x770 [ 677.953128] ? skb_scrub_packet+0x490/0x490 [ 677.957481] ? find_held_lock+0x36/0x1c0 [ 677.961590] __ip6_append_data.isra.47+0x27a4/0x3600 [ 677.966733] ? lock_downgrade+0x8f0/0x8f0 [ 677.970907] ? kasan_check_read+0x11/0x20 [ 677.975090] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 677.980129] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 677.984826] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 677.989164] ? dst_output+0x180/0x180 [ 677.992993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.998547] ? ip6_setup_cork+0x120b/0x1ac0 [ 678.002892] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 678.007845] ? mark_held_locks+0xc9/0x160 [ 678.012018] ? __local_bh_enable_ip+0x161/0x230 [ 678.016701] ? __local_bh_enable_ip+0x161/0x230 [ 678.021378] ? lockdep_hardirqs_on+0x421/0x5c0 [ 678.025970] ? trace_hardirqs_on+0xbd/0x2c0 [ 678.030301] ? lock_release+0x9f0/0x9f0 [ 678.034286] ? lock_sock_nested+0xe7/0x120 [ 678.038550] ip6_append_data+0x1b4/0x2d0 [ 678.042631] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 678.047665] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 678.052698] rawv6_sendmsg+0x11cb/0x4720 [ 678.056782] ? rawv6_getsockopt+0x140/0x140 [ 678.061129] ? print_usage_bug+0xc0/0xc0 [ 678.065203] ? __lock_acquire+0x7fc/0x5020 [ 678.069453] ? graph_lock+0x170/0x170 [ 678.073268] ? print_usage_bug+0xc0/0xc0 07:42:37 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000026, 0x0) 07:42:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x151, 0x7000000) [ 678.077335] ? mark_held_locks+0x160/0x160 [ 678.081583] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.087138] ? aa_label_sk_perm+0x45b/0x8d0 [ 678.091481] ? aa_profile_af_perm+0x430/0x430 [ 678.095983] ? find_held_lock+0x36/0x1c0 [ 678.100063] ? lock_downgrade+0x8f0/0x8f0 [ 678.104250] ? aa_af_perm+0x5a0/0x5a0 [ 678.108068] inet_sendmsg+0x1a1/0x690 [ 678.111892] ? rawv6_getsockopt+0x140/0x140 [ 678.116223] ? inet_sendmsg+0x1a1/0x690 [ 678.120212] ? ipip_gro_receive+0x100/0x100 [ 678.124548] ? apparmor_socket_sendmsg+0x29/0x30 [ 678.129322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.134872] ? security_socket_sendmsg+0x94/0xc0 [ 678.139641] ? ipip_gro_receive+0x100/0x100 [ 678.143975] sock_sendmsg+0xd5/0x120 [ 678.147700] ___sys_sendmsg+0x51d/0x930 [ 678.151683] ? graph_lock+0x170/0x170 [ 678.155498] ? copy_msghdr_from_user+0x580/0x580 [ 678.160273] ? find_held_lock+0x36/0x1c0 [ 678.164356] ? lock_downgrade+0x8f0/0x8f0 [ 678.168532] ? rcu_note_context_switch+0x680/0x680 [ 678.173481] ? check_same_owner+0x340/0x340 [ 678.177827] __sys_sendmmsg+0x240/0x6f0 [ 678.181875] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 678.186216] ? __lock_is_held+0xb5/0x140 [ 678.190311] ? fput+0x130/0x1a0 [ 678.193610] ? do_syscall_64+0x9a/0x820 [ 678.197596] ? do_syscall_64+0x9a/0x820 [ 678.201587] ? lockdep_hardirqs_on+0x421/0x5c0 [ 678.206191] ? trace_hardirqs_on+0xbd/0x2c0 [ 678.210524] ? __ia32_sys_read+0xb0/0xb0 [ 678.214597] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.219977] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 678.225120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.230675] __x64_sys_sendmmsg+0x9d/0x100 [ 678.234920] do_syscall_64+0x1b9/0x820 [ 678.238821] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 678.244202] ? syscall_return_slowpath+0x5e0/0x5e0 [ 678.249146] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 678.254180] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 678.259207] ? recalc_sigpending_tsk+0x180/0x180 [ 678.263974] ? kasan_check_write+0x14/0x20 [ 678.268225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 678.273103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.278307] RIP: 0033:0x457099 [ 678.281510] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.300426] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 678.308143] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 678.315417] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 678.322688] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 07:42:37 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x8f, 0x7000000) 07:42:37 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_setparam(r2, &(0x7f00000000c0)=0x100000001) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 678.329967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 678.337241] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 000000000000000d 07:42:37 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x201) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendfile(r0, r1, 0x0, 0xffffffffffff6498) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002200000e000000100000000000000000800120002000200000000000000000030000000030300080000000f0000000000000000000000000000000000000001ac1414bb0000000098120000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 678.441777] XFS (loop3): Invalid superblock magic number 07:42:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x6800000000000000}) 07:42:37 executing program 0 (fault-call:6 fault-nth:14): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x1, 0x3, [0x80, 0x3, 0x7]}, &(0x7f00000000c0)=0xe) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000140)={r2, 0x0, 0x6b, "d9823f748c95ec94b44de20635e11404531d6f5ec591b638d9e9c1b0a2e470b020009caec4165b17c9baa934c03f2f92579663c502ba310c5ff5e6cb2e6835da4c893fa444baebc9b5f2a3d031a0a14611f7377316356ea4506845c71c6fecdb3128868a55fb42617eb9ee"}, 0x73) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x100000000000000]}}]}, 0x68}}, 0x0) 07:42:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x17, 0x7000000) 07:42:37 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000000, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:37 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000001d, 0x0) [ 678.627165] FAULT_INJECTION: forcing a failure. [ 678.627165] name failslab, interval 1, probability 0, space 0, times 0 [ 678.638467] CPU: 1 PID: 20916 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 678.646968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.656327] Call Trace: [ 678.658930] dump_stack+0x1c9/0x2b4 [ 678.662575] ? dump_stack_print_info.cold.2+0x52/0x52 [ 678.667787] ? graph_lock+0x170/0x170 [ 678.671625] should_fail.cold.4+0xa/0x11 [ 678.675712] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 678.680834] ? print_usage_bug+0xc0/0xc0 [ 678.684923] ? graph_lock+0x170/0x170 [ 678.688744] ? find_held_lock+0x36/0x1c0 [ 678.692825] ? __lock_is_held+0xb5/0x140 [ 678.696917] ? check_same_owner+0x340/0x340 [ 678.701262] ? rcu_note_context_switch+0x680/0x680 [ 678.706226] __should_failslab+0x124/0x180 [ 678.710481] should_failslab+0x9/0x14 [ 678.714295] kmem_cache_alloc_node+0x256/0x720 [ 678.718901] __alloc_skb+0x119/0x770 [ 678.722640] ? skb_scrub_packet+0x490/0x490 07:42:38 executing program 6: r0 = socket$inet6(0xa, 0x80005, 0x8) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) move_pages(r2, 0x6, &(0x7f0000000040)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil], &(0x7f00000000c0)=[0x7, 0x5, 0x1], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000000002000000e000000100000000000000000800120002000200000000000000080030000000030300000000000f00000000000000000000000000000000000000d19841a466501363c783ad00000000000300050000000000020000768f8e3d4a65b8bb84c2ad5d6baae5b3d8db6fea569352dc640da85088416a2ab0183a97ab40a59c8967c6b030d1c4a5fe54abba58a30ee7f0457ddaaede3e313517bc199fbdda10e9bc3454f24ef556b2ffe0f874371ffb7618952c7ecdcc020981298eb16e23b92ee652ecceb1532454db"], 0x80}}, 0x0) 07:42:38 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000021, 0x0) [ 678.727000] ? find_held_lock+0x36/0x1c0 [ 678.731106] __ip6_append_data.isra.47+0x27a4/0x3600 [ 678.736229] ? lock_downgrade+0x8f0/0x8f0 [ 678.740400] ? kasan_check_read+0x11/0x20 [ 678.744570] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 678.749615] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 678.754306] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 678.758649] ? dst_output+0x180/0x180 [ 678.762478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.768028] ? ip6_setup_cork+0x120b/0x1ac0 [ 678.772370] ? ip6_autoflowlabel.part.48+0x80/0x80 07:42:38 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r1, &(0x7f0000005b80)=[{{&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/250, 0xfa}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f00000002c0)=""/107, 0x6b}], 0x3, &(0x7f0000000340)=""/160, 0xa0, 0x101}, 0x3}, {{&(0x7f0000000400)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000480)=""/16, 0x10}, {&(0x7f00000004c0)=""/58, 0x3a}, {&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000600)=""/52, 0x34}, {&(0x7f0000000640)=""/186, 0xba}, {&(0x7f0000000700)=""/18, 0x12}, {&(0x7f0000000740)=""/129, 0x81}, {&(0x7f0000000800)=""/174, 0xae}], 0x8, &(0x7f0000000940)=""/167, 0xa7, 0x5}, 0x7ff}, {{&(0x7f0000000a00)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000000a80)=""/142, 0x8e}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/231, 0xe7}, {&(0x7f0000001c40)=""/151, 0x97}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x5, &(0x7f0000002d80), 0x0, 0x80000000}, 0x1}, {{&(0x7f0000002dc0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/199, 0xc7}], 0x1, &(0x7f0000002f80)=""/123, 0x7b, 0x5419313d}, 0x6a}, {{&(0x7f0000003000)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000003100)=[{&(0x7f0000003080)=""/8, 0x8}, {&(0x7f00000030c0)=""/39, 0x27}], 0x2, &(0x7f0000003140)=""/200, 0xc8, 0xa}, 0x8}, {{&(0x7f0000003240)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000004500)=[{&(0x7f00000032c0)=""/142, 0x8e}, {&(0x7f0000003380)=""/4096, 0x1000}, {&(0x7f0000004380)=""/243, 0xf3}, {&(0x7f0000004480)=""/65, 0x41}], 0x4, &(0x7f0000004540)=""/254, 0xfe, 0x2}, 0x9}, {{&(0x7f0000004640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000005740)=[{&(0x7f00000046c0)=""/56, 0x38}, {&(0x7f0000004700)=""/49, 0x31}, {&(0x7f0000004740)=""/4096, 0x1000}], 0x3, &(0x7f0000005780)=""/39, 0x27, 0x2}, 0x81}, {{&(0x7f00000057c0)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000005840)=""/234, 0xea}, {&(0x7f0000005940)=""/184, 0xb8}, {&(0x7f0000005a00)=""/76, 0x4c}, {&(0x7f0000005a80)=""/171, 0xab}], 0x4, 0x0, 0x0, 0xfffffffffffffff7}}], 0x8, 0x0, &(0x7f0000005d80)={0x0, 0x989680}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000005dc0)={r2, 0x1, 0x6, @dev={[], 0x1e}}, 0x10) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 678.777315] ? mark_held_locks+0xc9/0x160 [ 678.781477] ? __local_bh_enable_ip+0x161/0x230 [ 678.786160] ? __local_bh_enable_ip+0x161/0x230 [ 678.790849] ? lockdep_hardirqs_on+0x421/0x5c0 [ 678.795450] ? trace_hardirqs_on+0xbd/0x2c0 [ 678.799794] ? lock_release+0x9f0/0x9f0 [ 678.803785] ? lock_sock_nested+0xe7/0x120 [ 678.808042] ip6_append_data+0x1b4/0x2d0 [ 678.812131] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 678.817166] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 678.822207] rawv6_sendmsg+0x11cb/0x4720 [ 678.826293] ? rawv6_getsockopt+0x140/0x140 [ 678.830640] ? print_usage_bug+0xc0/0xc0 [ 678.834715] ? __lock_acquire+0x7fc/0x5020 [ 678.838966] ? graph_lock+0x170/0x170 [ 678.842777] ? print_usage_bug+0xc0/0xc0 [ 678.846849] ? mark_held_locks+0x160/0x160 [ 678.851109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.856665] ? aa_label_sk_perm+0x45b/0x8d0 [ 678.861509] ? aa_profile_af_perm+0x430/0x430 [ 678.866015] ? find_held_lock+0x36/0x1c0 [ 678.870110] ? lock_downgrade+0x8f0/0x8f0 [ 678.874292] ? aa_af_perm+0x5a0/0x5a0 [ 678.878124] inet_sendmsg+0x1a1/0x690 [ 678.881938] ? rawv6_getsockopt+0x140/0x140 [ 678.886261] ? inet_sendmsg+0x1a1/0x690 [ 678.890249] ? ipip_gro_receive+0x100/0x100 [ 678.894582] ? apparmor_socket_sendmsg+0x29/0x30 [ 678.899361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.904914] ? security_socket_sendmsg+0x94/0xc0 [ 678.909679] ? ipip_gro_receive+0x100/0x100 [ 678.914012] sock_sendmsg+0xd5/0x120 [ 678.917739] ___sys_sendmsg+0x51d/0x930 [ 678.921726] ? graph_lock+0x170/0x170 07:42:38 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$notify(r0, 0x402, 0xf) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 678.925540] ? copy_msghdr_from_user+0x580/0x580 [ 678.930318] ? find_held_lock+0x36/0x1c0 [ 678.934403] ? lock_downgrade+0x8f0/0x8f0 [ 678.938582] ? rcu_note_context_switch+0x680/0x680 [ 678.943535] ? check_same_owner+0x340/0x340 [ 678.947878] __sys_sendmmsg+0x240/0x6f0 [ 678.951876] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 678.956208] ? __lock_is_held+0xb5/0x140 [ 678.960298] ? fput+0x130/0x1a0 [ 678.963594] ? do_syscall_64+0x9a/0x820 [ 678.967590] ? do_syscall_64+0x9a/0x820 [ 678.971584] ? lockdep_hardirqs_on+0x421/0x5c0 07:42:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x17b, 0x7000000) [ 678.976193] ? trace_hardirqs_on+0xbd/0x2c0 [ 678.980525] ? __ia32_sys_read+0xb0/0xb0 [ 678.984608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.989983] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 678.995109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.000662] __x64_sys_sendmmsg+0x9d/0x100 [ 679.004912] do_syscall_64+0x1b9/0x820 [ 679.008814] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 679.014194] ? syscall_return_slowpath+0x5e0/0x5e0 [ 679.019147] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 679.024180] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 679.029221] ? recalc_sigpending_tsk+0x180/0x180 [ 679.033993] ? kasan_check_write+0x14/0x20 [ 679.038250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 679.043122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.048323] RIP: 0033:0x457099 [ 679.051529] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.070432] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 07:42:38 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000005, 0x0) [ 679.078154] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 679.085434] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 679.092715] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 679.099988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 679.107267] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 000000000000000e 07:42:38 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000180)={0x6, 0x4, 0x100000000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000140)={@remote, r2}, 0x14) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 679.144790] XFS (loop3): Invalid superblock magic number 07:42:38 executing program 0 (fault-call:6 fault-nth:15): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x400000000000000]}}]}, 0x68}}, 0x0) 07:42:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x7a00000000000000}) 07:42:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x49, 0x7000000) 07:42:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x40000000, 0xa, 0x0, 0x0, 0x25dfdbfb, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_ident={0x2, 0xb, 0x2, 0x0, 0x3}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x40) 07:42:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x484400, 0x0) clock_gettime(0xfffffffffffffffc, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000240)={{0x4, 0x3, 0xffffffff, 0x9, 'syz0\x00', 0x7ff}, 0x1, [0x0, 0x5, 0x6, 0x4, 0x8, 0x5, 0x5, 0x0, 0xc8de, 0xffff, 0x8fc, 0x800, 0x5, 0x0, 0x10000, 0x6, 0x0, 0x1, 0x8, 0x5, 0x400, 0xd5, 0xfffffffffffeffff, 0x400000, 0x9, 0xea0, 0x7a, 0xc9be, 0xfffffffffffffffa, 0x6, 0x200, 0x1286000000, 0x0, 0x0, 0x1f, 0x1, 0xf99, 0x400, 0x2, 0x5, 0x4, 0x0, 0x3, 0x6, 0x101, 0xfffffffffffffffc, 0xfffffffffffffffb, 0x2ae, 0x3, 0x63, 0x0, 0x80, 0x400, 0x1, 0x40, 0xfffffffffffffffb, 0x20, 0x800, 0x4, 0x81, 0x0, 0x80000000, 0x2, 0x5a3d7832, 0x80000000, 0x2, 0x6, 0x2, 0x5, 0x4, 0x7fff, 0x6, 0x100, 0xeb0, 0x7f, 0xd77, 0xa8, 0x6, 0x3, 0x0, 0xa2, 0x8, 0x7f, 0x4, 0x3ff, 0x6, 0x80000000, 0x6, 0x7fffffff, 0x400, 0x1, 0x5, 0x8, 0x2, 0x5, 0x5, 0x40, 0x4, 0x7, 0x7ff, 0x80000001, 0x3, 0x2, 0x8, 0x9162, 0x2, 0x8, 0x3f, 0x4, 0x6, 0x7f, 0x7, 0x2, 0x0, 0x9470, 0xffff, 0x100000001, 0x400, 0x2, 0x9, 0x9, 0x6, 0x3, 0x5, 0xc4f, 0x80, 0xfffffffffffffff7, 0xfffffffffffffffa], {r2, r3+30000000}}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$inet6(0xa, 0x0, 0x6) r4 = socket$key(0xf, 0x3, 0x2) socket$bt_rfcomm(0x1f, 0xfffffffffffffffe, 0x3) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 679.356297] FAULT_INJECTION: forcing a failure. [ 679.356297] name failslab, interval 1, probability 0, space 0, times 0 [ 679.367717] CPU: 1 PID: 20992 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 679.376215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.385583] Call Trace: [ 679.388197] dump_stack+0x1c9/0x2b4 [ 679.391849] ? dump_stack_print_info.cold.2+0x52/0x52 [ 679.397066] should_fail.cold.4+0xa/0x11 [ 679.401152] ? __kernel_text_address+0xd/0x40 07:42:38 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) mq_open(&(0x7f0000000000)='posix_acl_access+*\':-\x00', 0x0, 0x92, &(0x7f00000000c0)={0x16c87268, 0x7fffffff, 0x1ff, 0x7fff, 0x6c, 0xfff, 0x6, 0x2}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:38 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000029, 0x0) 07:42:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x40030000000000]}}]}, 0x68}}, 0x0) [ 679.405665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 679.410800] ? __save_stack_trace+0x8d/0xf0 [ 679.415151] ? graph_lock+0x170/0x170 [ 679.418970] ? save_stack+0x43/0xd0 [ 679.422611] ? kasan_kmalloc+0xc4/0xe0 [ 679.426513] ? find_held_lock+0x36/0x1c0 [ 679.430591] ? __lock_is_held+0xb5/0x140 [ 679.434684] ? check_same_owner+0x340/0x340 [ 679.439021] ? mark_held_locks+0xc9/0x160 [ 679.443191] ? rcu_note_context_switch+0x680/0x680 [ 679.448135] ? kmem_cache_alloc_node+0x217/0x720 [ 679.452912] __should_failslab+0x124/0x180 [ 679.457174] should_failslab+0x9/0x14 [ 679.460990] kmem_cache_alloc_node_trace+0x259/0x720 [ 679.466129] __kmalloc_node_track_caller+0x33/0x70 [ 679.471098] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 679.475875] __alloc_skb+0x155/0x770 [ 679.479628] ? skb_scrub_packet+0x490/0x490 [ 679.484004] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 679.488785] ? retint_kernel+0x10/0x10 [ 679.492697] ? lock_release+0x4dc/0x9f0 [ 679.496717] __ip6_append_data.isra.47+0x27a4/0x3600 [ 679.501836] ? lock_downgrade+0x8f0/0x8f0 [ 679.506015] ? kasan_check_read+0x11/0x20 [ 679.510182] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 679.515215] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 679.519908] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 679.524245] ? dst_output+0x180/0x180 [ 679.528076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.533644] ? ip6_setup_cork+0x120b/0x1ac0 [ 679.537987] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 679.542928] ? mark_held_locks+0xc9/0x160 [ 679.547100] ? __local_bh_enable_ip+0x161/0x230 [ 679.551780] ? __local_bh_enable_ip+0x161/0x230 07:42:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xe7, 0x7000000) [ 679.556457] ? lockdep_hardirqs_on+0x421/0x5c0 [ 679.561063] ? trace_hardirqs_on+0xbd/0x2c0 [ 679.565400] ? lock_release+0x9f0/0x9f0 [ 679.569388] ? lock_sock_nested+0xe7/0x120 [ 679.573643] ip6_append_data+0x1b4/0x2d0 [ 679.577737] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 679.582769] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 679.587800] rawv6_sendmsg+0x11cb/0x4720 [ 679.591888] ? rawv6_getsockopt+0x140/0x140 [ 679.596225] ? find_held_lock+0x36/0x1c0 [ 679.600311] ? graph_lock+0x170/0x170 [ 679.604121] ? print_usage_bug+0xc0/0xc0 [ 679.608195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.613745] ? aa_label_sk_perm+0x45b/0x8d0 [ 679.618095] ? aa_profile_af_perm+0x430/0x430 [ 679.622617] ? find_held_lock+0x36/0x1c0 [ 679.626700] ? lock_downgrade+0x8f0/0x8f0 [ 679.630884] ? aa_af_perm+0x5a0/0x5a0 [ 679.634703] inet_sendmsg+0x1a1/0x690 [ 679.638517] ? rawv6_getsockopt+0x140/0x140 [ 679.642847] ? inet_sendmsg+0x1a1/0x690 [ 679.646834] ? ipip_gro_receive+0x100/0x100 [ 679.651168] ? apparmor_socket_sendmsg+0x29/0x30 07:42:39 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) [ 679.655941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.661485] ? security_socket_sendmsg+0x94/0xc0 [ 679.666252] ? ipip_gro_receive+0x100/0x100 [ 679.670585] sock_sendmsg+0xd5/0x120 [ 679.674315] ___sys_sendmsg+0x51d/0x930 [ 679.678296] ? graph_lock+0x170/0x170 [ 679.682117] ? __switch_to_asm+0x34/0x70 [ 679.686195] ? copy_msghdr_from_user+0x580/0x580 [ 679.690971] ? __schedule+0x884/0x1df0 [ 679.694878] ? find_held_lock+0x36/0x1c0 [ 679.698962] ? lock_downgrade+0x8f0/0x8f0 [ 679.703138] ? rcu_note_context_switch+0x680/0x680 [ 679.708097] ? check_same_owner+0x340/0x340 [ 679.712439] __sys_sendmmsg+0x240/0x6f0 [ 679.716430] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 679.720814] ? __lock_is_held+0xb5/0x140 [ 679.724912] ? fput+0x130/0x1a0 [ 679.728387] ? do_syscall_64+0x9a/0x820 [ 679.732370] ? do_syscall_64+0x9a/0x820 [ 679.736356] ? lockdep_hardirqs_on+0x421/0x5c0 [ 679.740951] ? trace_hardirqs_on+0xbd/0x2c0 [ 679.745291] ? __ia32_sys_read+0xb0/0xb0 [ 679.749366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.754733] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 679.759851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.765406] __x64_sys_sendmmsg+0x9d/0x100 [ 679.769658] do_syscall_64+0x1b9/0x820 [ 679.773562] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 679.778948] ? syscall_return_slowpath+0x5e0/0x5e0 [ 679.783888] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 679.788917] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 679.793945] ? recalc_sigpending_tsk+0x180/0x180 [ 679.798974] ? kasan_check_write+0x14/0x20 [ 679.803222] ? trace_hardirqs_off_thunk+0x1a/0x1c 07:42:39 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x28a00, 0x180) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000140)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") fanotify_init(0x8, 0x2) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:39 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000001e, 0x0) [ 679.808096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.813296] RIP: 0033:0x457099 [ 679.816495] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.835403] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 679.843128] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 679.850407] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 679.857685] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 679.864958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 679.872239] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 000000000000000f 07:42:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x160, 0x7000000) 07:42:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xffffff7f00000000]}}]}, 0x68}}, 0x0) 07:42:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x6, 0x800) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x280200, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000040)) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e002000000000000000000000c00120002000200000000000000000030000000030300000000400f00000000000000a8000000000000000000000001ac1414bb00000000000000000000000003000500000000000200001ce00000010000000000000000"], 0x80}}, 0x0) 07:42:39 executing program 0 (fault-call:6 fault-nth:16): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = socket(0x5, 0x7, 0x800) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x33, @multicast1, 0x4e20, 0x1, 'sh\x00', 0x4, 0x8001, 0xa}, {@loopback, 0x4e20, 0x2000, 0x40, 0x4, 0x401}}, 0x44) [ 680.059304] XFS (loop3): Invalid superblock magic number [ 680.171745] FAULT_INJECTION: forcing a failure. [ 680.171745] name failslab, interval 1, probability 0, space 0, times 0 [ 680.183623] CPU: 0 PID: 21058 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 680.192126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.201484] Call Trace: [ 680.204108] dump_stack+0x1c9/0x2b4 [ 680.207772] ? dump_stack_print_info.cold.2+0x52/0x52 [ 680.212989] should_fail.cold.4+0xa/0x11 [ 680.217062] ? __kernel_text_address+0xd/0x40 [ 680.221592] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 680.226716] ? mark_held_locks+0xc9/0x160 [ 680.230883] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.235657] ? lockdep_hardirqs_on+0x421/0x5c0 [ 680.240254] ? retint_kernel+0x10/0x10 [ 680.244165] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 680.249128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.253902] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 680.259371] ? find_held_lock+0x36/0x1c0 [ 680.263455] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.268235] ? retint_kernel+0x10/0x10 07:42:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x68000000}) 07:42:39 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') r4 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001600)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) r6 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001900)=0x0) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a00)={0x0, 0x0, 0x0}, &(0x7f0000001a40)=0xc) r10 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001b40), &(0x7f0000001b80), &(0x7f0000001bc0)=0x0) r13 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getgid() sendmsg$netlink(r1, &(0x7f0000001d80)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x100911}, 0xc, &(0x7f00000018c0)=[{&(0x7f0000000140)={0x2a8, 0x1a, 0x320, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x6, @u32=0xf3a0}, @nested={0x290, 0x62, [@typed={0x8, 0x1b, @pid=r4}, @typed={0x4, 0x4}, @generic="408d727f7b8ef36740fabc581802178d5a51d112ad905e684b972099e58bb448f6618077ffac1e7eddf8195ee855160db36b7298a3974daff9e81933633cc974450ba60643629b0c83e2602fea4efe40a01ea536426068f887ba7dc465aca1b68d511702e396aa8774856022e98a9fb15b8bca6bc5eeba780b0df8731ee81957bb664139c34688762cf46e3c36cad75e5be0c2714e27a863ee6c5a8ef814ab7f021edb2a0ee57476bca82e519f8a409766696b4fbb0d829a9cb0b37d7abedac4179bf670f21c9e259f080e876cb4dfb755f8a78e6333d3ee332f98cc82", @generic="4ca753d3585c70544642520c894e96fd8d394de1c3fefb307b3d629c36ca820e4b07a55f7a2361988a284dd9fc88579a4427124e28ae016796b5e321ad3b917b9b05400d0c177438aff9a4edf358c93d3ad2a7f67e6a7ec77a784c9857c1d241a9ff60e3b6413e1ff77a013131cc", @generic="4ad6c5b952e4fcb90b00283c46d5d5637f445adab361ecfc8f1e8948fe76a1825e1a771beaccdb71711cdb37c5765cd7fd5953dae62a90bc4dd64d2967955d925d881d6c3a37d3890df88c376ef12c87e95878f816c7f8f9ebbbc210326dacdedf97eb45244a200bdecc8ba7f97bda4868ef4b4f2b3f056b0fe7d6ce2458be3ecdc52d8c", @generic="01f6e1a0fe2856453e3800f8c6850d4ced92e55cb7ae1a2614fb8ea440f26466879a92b6f4fa4fc7f650c3d7d4bdec2581d06842195278f65c3b47a38c2c3cefc649c1edddc9d6ca898b91f9d33536d55a7b9112eead8902005bdf7255809f7927e103621ceca40c1bad7d127f9dbc172c03e7891b4a4538742db0c09312eb86d4e7661f0d7faa7c2af7c95253acb925f77663182b53d32f263491f1ea381cad831c290415fd476c0302d51a233a"]}]}, 0x2a8}, {&(0x7f0000000400)={0xc8, 0x32, 0x500, 0x70bd2b, 0x25dfdbfe, "", [@typed={0xb4, 0x8e, @binary="914a2d209ad8600f4fb377af206eb2e9fbfef6e27b82efabbea66b00b51547aad76513d4b43a09a34a13638305bfe87b1324800688741568daa27033176ad586b12501aa4e1f6ee9fcb84820dd70632e1c45ef259c8ab468210fb6ec31413592b53162a07fe5575889d6354ee300f3168f9252ac39bf2a52dbf7d5d02ea2bc812cc23119f52da6246a04f24714298d1cd5a9532e37cec6d4e5bb79ed8cb0b3e93246698e41107bcd37558fa01d53"}, @nested={0x4, 0x12}, @generic]}, 0xc8}, {&(0x7f0000000500)={0x10d0, 0x22, 0x800, 0x70bd2d, 0x25dfdbfc, "", [@generic="27091c5cdf3a813fabf85484a101e322202327c603907c28282d4c3e29478c9d7b06b206c69060253ffe1d1e6404ffc5b6137828b00a12118e87fa4e394c0bded101f81fe5546b59196dfd664fca1d30c246387b8ba382d5be66af9b649a6097e9b1ad6d55450e71ad9e73c2abe8f2e89bfc6b855b020d9b7e79a365e767e3e7730a3110dd100dfcdddb6ac1d4d574ffdb42942bbd0fda1e20aef0aa245cc398bd0c1c0759b2", @nested={0x1018, 0x25, [@generic="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", @typed={0xc, 0x4e, @u64=0x40000000000}, @typed={0x8, 0x37, @ipv4=@rand_addr=0x7}]}]}, 0x10d0}, {&(0x7f0000001700)={0x188, 0x35, 0x706, 0x70bd28, 0x25dfdbfc, "", [@generic="df378a26eb98012b24f1c95b0d806b9778dc363c8212191b9170237bbd0528df8ea9129773998d50b2f1b1dfadfb152b04ed4f67f0370a3b176b1dee28a0260d74279bdabb719049d33f9424cf539f035a07dd21", @generic="b094c93d932be9fbca626e7a28a05f3d05c172d6e2d644e79e26841373b6483dc32cb09b5d99b8f0f45ba117174b94f1df4a88468e302b5991b4157b43e4034dc0acc8647f631543b22e3a6689d086580ac0f28a167b1c81cf976fbbc07ea6c84b863b18a89568109d9f6e7a1bd540523542343231a07e53bb21844efdbeae135cc7662a", @generic="1f2065f8fd2d164d0d123fc5cd1100abefdba035ddd425f27bcf63ac1c570f8d9ba700910f2d6df6c019", @typed={0x4, 0x6b}, @typed={0x4, 0x10}, @nested={0x14, 0x77, [@typed={0x8, 0x54, @uid=r5}, @typed={0x8, 0x8c, @pid=r6}]}, @generic="787da8bda75b1503a437f0a4603e27fa8e2a3168079c0f0e01c1ebaca5575fdbc4524c36c6a84ad6d684bed4789b9db92ab8e55c174a34fbd135336deae237c41cdb67a888129bf64870bd51cec2cda84a8079b93a68da"]}, 0x188}], 0x4, &(0x7f0000001cc0)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x38, 0x1, 0x1, [r2, r1, r0, r0, r1, r2, r0, r1, r0, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x98}, 0x40080d1) 07:42:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x16d, 0x7000000) 07:42:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x20000000]}}]}, 0x68}}, 0x0) 07:42:39 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000001c, 0x0) 07:42:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1ba, 0x7000000) [ 680.272152] ? __should_failslab+0x7c/0x180 [ 680.276671] ? write_comp_data+0x6c/0x70 [ 680.280755] __should_failslab+0x124/0x180 [ 680.285010] should_failslab+0x9/0x14 [ 680.288828] kmem_cache_alloc_node_trace+0x259/0x720 [ 680.293957] __kmalloc_node_track_caller+0x33/0x70 [ 680.298904] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 680.303854] __alloc_skb+0x155/0x770 [ 680.307585] ? skb_scrub_packet+0x490/0x490 [ 680.311928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.316713] ? retint_kernel+0x10/0x10 07:42:39 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x240080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x11}, 0x9a44}}, [0x74ad, 0x2, 0x8, 0x20, 0x7, 0x1, 0x9, 0x0, 0x8001, 0x7, 0x9, 0x20, 0x81, 0x1, 0x8]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x7, 0x1, 0x5, 0x0, 0x1319, 0x1, 0xdf, 0xcd, r1}, &(0x7f00000002c0)=0x20) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x6, 0x8) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 680.320629] ? __ip6_append_data.isra.47+0x7a4/0x3600 [ 680.325842] __ip6_append_data.isra.47+0x27a4/0x3600 [ 680.330958] ? lock_downgrade+0x8f0/0x8f0 [ 680.335140] ? kasan_check_read+0x11/0x20 [ 680.339306] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 680.344344] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 680.349016] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 680.353349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.358897] ? ip6_setup_cork+0x120b/0x1ac0 [ 680.363231] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 680.368159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.372907] ? retint_kernel+0x10/0x10 [ 680.376784] ip6_append_data+0x1b4/0x2d0 [ 680.380837] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 680.385855] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 680.390870] rawv6_sendmsg+0x11cb/0x4720 [ 680.394926] ? rawv6_getsockopt+0x140/0x140 [ 680.399248] ? find_held_lock+0x36/0x1c0 [ 680.403314] ? graph_lock+0x170/0x170 [ 680.407124] ? kasan_check_read+0x11/0x20 [ 680.411275] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.416798] ? aa_label_sk_perm+0x45b/0x8d0 [ 680.421283] ? aa_profile_af_perm+0x430/0x430 [ 680.425763] ? lockdep_hardirqs_on+0x421/0x5c0 [ 680.430330] ? find_held_lock+0x36/0x1c0 [ 680.434376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.439128] ? lockdep_hardirqs_on+0x421/0x5c0 [ 680.443695] ? retint_kernel+0x10/0x10 [ 680.447584] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 680.453037] ? aa_af_perm+0x5a0/0x5a0 [ 680.456828] inet_sendmsg+0x1a1/0x690 [ 680.460617] ? rawv6_getsockopt+0x140/0x140 [ 680.464925] ? inet_sendmsg+0x1a1/0x690 [ 680.468900] ? ipip_gro_receive+0x100/0x100 [ 680.473228] ? apparmor_socket_sendmsg+0x29/0x30 [ 680.477989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.483523] ? security_socket_sendmsg+0x94/0xc0 [ 680.488289] ? ipip_gro_receive+0x100/0x100 [ 680.492608] sock_sendmsg+0xd5/0x120 [ 680.496316] ___sys_sendmsg+0x51d/0x930 [ 680.500284] ? __switch_to_asm+0x34/0x70 [ 680.504338] ? __switch_to_asm+0x40/0x70 [ 680.508392] ? __switch_to_asm+0x34/0x70 [ 680.512456] ? copy_msghdr_from_user+0x580/0x580 [ 680.517220] ? __schedule+0x884/0x1df0 [ 680.521117] ? __sched_text_start+0x8/0x8 [ 680.525265] ? lock_downgrade+0x8f0/0x8f0 [ 680.529402] ? __switch_to_asm+0x40/0x70 [ 680.533458] ? check_same_owner+0x340/0x340 [ 680.537774] __sys_sendmmsg+0x240/0x6f0 [ 680.541738] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 680.546048] ? __lock_is_held+0xb5/0x140 [ 680.550115] ? fput+0x130/0x1a0 [ 680.553385] ? do_syscall_64+0x9a/0x820 [ 680.557345] ? do_syscall_64+0x9a/0x820 [ 680.561312] ? lockdep_hardirqs_on+0x421/0x5c0 [ 680.565894] ? trace_hardirqs_on+0xbd/0x2c0 [ 680.570211] ? __ia32_sys_read+0xb0/0xb0 [ 680.574273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.579634] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 680.584724] __x64_sys_sendmmsg+0x9d/0x100 [ 680.588951] do_syscall_64+0x1b9/0x820 [ 680.592838] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 680.598202] ? syscall_return_slowpath+0x5e0/0x5e0 [ 680.603128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 680.607955] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 680.612973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.618511] ? prepare_exit_to_usermode+0x291/0x3b0 [ 680.623526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 680.628358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.633535] RIP: 0033:0x457099 [ 680.636723] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.655616] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 680.663313] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 07:42:40 executing program 0 (fault-call:6 fault-nth:17): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 680.670573] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 680.677841] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 680.685115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 680.692379] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000010 07:42:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000000003030000000000000000000001ac14000000030005000000000002008000e20000010000000000000000"], 0x80}}, 0x0) r2 = memfd_create(&(0x7f0000000000)='selfself\'/', 0x2) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x2, 0x10, 0x400, 0xe}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000240)={r3, 0x1, 0x1ff, 0x4, 0x7f, 0x20, 0x6, 0x7f, {r4, @in6={{0xa, 0x4e22, 0x100000000, @loopback, 0x2}}, 0x5, 0x8, 0x405e, 0x81, 0x9}}, &(0x7f0000000300)=0xb0) 07:42:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2000]}}]}, 0x68}}, 0x0) 07:42:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 07:42:40 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000014, 0x0) 07:42:40 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x73, 0x7000000) [ 680.932121] XFS (loop3): Invalid superblock magic number [ 680.962091] FAULT_INJECTION: forcing a failure. [ 680.962091] name failslab, interval 1, probability 0, space 0, times 0 [ 680.973497] CPU: 0 PID: 21109 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 07:42:40 executing program 6: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000140)=0xff, &(0x7f0000000180)=0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) rt_tgsigqueueinfo(r3, r4, 0x1a, &(0x7f0000000240)={0x13, 0x4, 0x100000000, 0xe989}) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 680.981996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.991354] Call Trace: [ 680.993959] dump_stack+0x1c9/0x2b4 [ 680.997612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 681.002833] should_fail.cold.4+0xa/0x11 [ 681.006911] ? __kernel_text_address+0xd/0x40 [ 681.011426] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 681.016540] ? __save_stack_trace+0x8d/0xf0 [ 681.020897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.025674] ? lockdep_hardirqs_on+0x421/0x5c0 07:42:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x7000}) [ 681.030276] ? retint_kernel+0x10/0x10 [ 681.034175] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 681.039130] ? kasan_kmalloc+0xc4/0xe0 [ 681.043033] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.047804] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 681.053269] ? find_held_lock+0x36/0x1c0 [ 681.057352] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.062152] ? __should_failslab+0x7c/0x180 [ 681.066500] __should_failslab+0x124/0x180 [ 681.070755] should_failslab+0x9/0x14 [ 681.074577] kmem_cache_alloc_node_trace+0x259/0x720 [ 681.079707] __kmalloc_node_track_caller+0x33/0x70 [ 681.084664] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 681.089445] __alloc_skb+0x155/0x770 [ 681.093181] ? skb_scrub_packet+0x490/0x490 [ 681.097524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.102306] ? retint_kernel+0x10/0x10 [ 681.106243] ? __ip6_append_data.isra.47+0x26fc/0x3600 [ 681.111543] __ip6_append_data.isra.47+0x27a4/0x3600 [ 681.116661] ? lock_downgrade+0x8f0/0x8f0 [ 681.120848] ? kasan_check_read+0x11/0x20 [ 681.125018] ? rawv6_mh_filter_unregister+0xe0/0xe0 07:42:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 681.130048] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 681.134747] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 681.139092] ? lockdep_hardirqs_on+0x421/0x5c0 [ 681.143691] ? retint_kernel+0x10/0x10 [ 681.147598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.153147] ? ip6_setup_cork+0x120b/0x1ac0 [ 681.157484] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 681.162428] ? mark_held_locks+0xc9/0x160 [ 681.166596] ? __local_bh_enable_ip+0x161/0x230 [ 681.171277] ? __local_bh_enable_ip+0x161/0x230 [ 681.175964] ? lockdep_hardirqs_on+0x421/0x5c0 [ 681.180559] ? trace_hardirqs_on+0xbd/0x2c0 [ 681.184891] ? lock_release+0x9f0/0x9f0 [ 681.188879] ? lock_sock_nested+0xe7/0x120 [ 681.193138] ip6_append_data+0x1b4/0x2d0 [ 681.197218] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 681.202251] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 681.207282] rawv6_sendmsg+0x11cb/0x4720 [ 681.211380] ? rawv6_getsockopt+0x140/0x140 [ 681.215719] ? find_held_lock+0x36/0x1c0 [ 681.219807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.224572] ? lockdep_hardirqs_on+0x421/0x5c0 [ 681.229170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.234719] ? aa_label_sk_perm+0x45b/0x8d0 [ 681.239058] ? aa_profile_af_perm+0x430/0x430 [ 681.243593] ? retint_kernel+0x10/0x10 [ 681.247502] ? aa_sk_perm+0xa9/0x8a0 [ 681.251231] ? aa_af_perm+0x5a0/0x5a0 [ 681.255053] inet_sendmsg+0x1a1/0x690 [ 681.258868] ? rawv6_getsockopt+0x140/0x140 [ 681.263194] ? inet_sendmsg+0x1a1/0x690 [ 681.267180] ? ipip_gro_receive+0x100/0x100 [ 681.271511] ? apparmor_socket_sendmsg+0x29/0x30 [ 681.276286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:42:40 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000022, 0x0) [ 681.281834] ? security_socket_sendmsg+0x94/0xc0 [ 681.286599] ? ipip_gro_receive+0x100/0x100 [ 681.290927] sock_sendmsg+0xd5/0x120 [ 681.294646] ___sys_sendmsg+0x51d/0x930 [ 681.298625] ? __switch_to_asm+0x34/0x70 [ 681.302694] ? __switch_to_asm+0x40/0x70 [ 681.306763] ? __switch_to_asm+0x34/0x70 [ 681.310842] ? copy_msghdr_from_user+0x580/0x580 [ 681.315611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.320380] ? lockdep_hardirqs_on+0x421/0x5c0 [ 681.324975] ? retint_kernel+0x10/0x10 [ 681.328872] ? trace_hardirqs_on_caller+0xc0/0x2b0 07:42:40 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1ca, 0x7000000) 07:42:40 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") poll(&(0x7f0000000000)=[{r0, 0x2000}], 0x1, 0x9) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 681.333812] ? __sched_text_start+0x8/0x8 [ 681.337971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.342735] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 681.348210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.352988] ? retint_kernel+0x10/0x10 [ 681.356894] ? __sys_sendmmsg+0x35e/0x6f0 [ 681.361058] __sys_sendmmsg+0x240/0x6f0 [ 681.365069] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 681.369423] ? __lock_is_held+0xb5/0x140 [ 681.373511] ? fput+0x130/0x1a0 [ 681.376801] ? do_syscall_64+0x9a/0x820 [ 681.380785] ? do_syscall_64+0x9a/0x820 [ 681.384776] ? lockdep_hardirqs_on+0x421/0x5c0 [ 681.389369] ? trace_hardirqs_on+0xbd/0x2c0 [ 681.393702] ? __ia32_sys_read+0xb0/0xb0 [ 681.397775] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.403148] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 681.408265] __x64_sys_sendmmsg+0x9d/0x100 [ 681.412518] do_syscall_64+0x1b9/0x820 [ 681.416420] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 681.421797] ? syscall_return_slowpath+0x5e0/0x5e0 [ 681.426737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 681.431585] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 681.436612] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 681.441641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.447202] ? prepare_exit_to_usermode+0x291/0x3b0 [ 681.452230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 681.457115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.462316] RIP: 0033:0x457099 [ 681.465519] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:42:40 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000011, 0x0) [ 681.484428] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 681.492150] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 681.499426] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 681.506696] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 681.513986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 681.521257] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000011 07:42:40 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x145, 0x7000000) 07:42:40 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x2, 0x240000) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x80000000007ffd, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000016c0)={0x0, 0x0, @pic={0x9, 0x40bd, 0x34f, 0x1, 0x9, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x81, 0x8001, 0x0, 0x8}}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x5d, &(0x7f0000000080), 0x0) mlockall(0x1) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0)=0x31, 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000640)="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", 0xe45) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f00000002c0)="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") r5 = dup2(r3, r2) connect$packet(r5, &(0x7f0000000040)={0x11, 0x4, r4, 0x1, 0x4, 0x6, @broadcast}, 0x14) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x800, 0x1) ioctl(r1, 0x2, &(0x7f0000000240)="0a0500000afd00000050708b9e3cb0d851") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x8) accept$alg(r6, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/90, &(0x7f0000000000)=0x5a) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x502a, 0x2) 07:42:40 executing program 0 (fault-call:6 fault-nth:18): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000054408871cfa20da100000100000002000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000001000000030005000000b957bb8c07180964000100000000000000009959b276941b48e1c58c5ff6b1d97a3d1afcb381a9b453bc417b7f4d5a157455ac47bf494974421cd3ce60d65eef27534ee431c58bfc02972dceb3f013b5d986b7101d800ebc4ce316dd303c5c6da84361ac31c684622d58481d6039"], 0x80}}, 0x0) 07:42:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x4]}}]}, 0x68}}, 0x0) 07:42:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d00001000000000000000000000d13a00030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 681.674441] XFS (loop3): Invalid superblock magic number 07:42:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x3d, 0x7000000) 07:42:41 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000006, 0x0) [ 681.827440] FAULT_INJECTION: forcing a failure. [ 681.827440] name failslab, interval 1, probability 0, space 0, times 0 [ 681.838901] CPU: 0 PID: 21200 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 681.847889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.857247] Call Trace: [ 681.859850] dump_stack+0x1c9/0x2b4 [ 681.863493] ? dump_stack_print_info.cold.2+0x52/0x52 [ 681.868710] should_fail.cold.4+0xa/0x11 [ 681.872795] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 681.877916] ? print_usage_bug+0xc0/0xc0 [ 681.882004] ? graph_lock+0x170/0x170 [ 681.885828] ? find_held_lock+0x36/0x1c0 [ 681.889911] ? __lock_is_held+0xb5/0x140 [ 681.894004] ? check_same_owner+0x340/0x340 [ 681.898347] ? rcu_note_context_switch+0x680/0x680 [ 681.903299] __should_failslab+0x124/0x180 [ 681.907554] should_failslab+0x9/0x14 [ 681.911370] kmem_cache_alloc_node+0x256/0x720 [ 681.915975] ? lockdep_hardirqs_on+0x421/0x5c0 [ 681.920576] ? retint_kernel+0x10/0x10 [ 681.924484] __alloc_skb+0x119/0x770 07:42:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000070000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2000000000000000]}}]}, 0x68}}, 0x0) 07:42:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x4800}) [ 681.928221] ? skb_scrub_packet+0x490/0x490 [ 681.932565] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.937350] ? retint_kernel+0x10/0x10 [ 681.941278] ? __ip6_append_data.isra.47+0x1c6d/0x3600 [ 681.946577] __ip6_append_data.isra.47+0x27a4/0x3600 [ 681.951698] ? lock_downgrade+0x8f0/0x8f0 [ 681.955868] ? kasan_check_read+0x11/0x20 [ 681.960034] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 681.965066] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 681.969776] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 681.974130] ? dst_output+0x180/0x180 [ 681.977962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.983510] ? ip6_setup_cork+0x120b/0x1ac0 [ 681.987858] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 681.992809] ? mark_held_locks+0xc9/0x160 [ 681.996980] ? __local_bh_enable_ip+0x161/0x230 [ 682.001670] ? __local_bh_enable_ip+0x161/0x230 [ 682.006354] ? lockdep_hardirqs_on+0x421/0x5c0 [ 682.010948] ? trace_hardirqs_on+0xbd/0x2c0 [ 682.015283] ? lock_release+0x9f0/0x9f0 [ 682.019275] ? lock_sock_nested+0xe7/0x120 [ 682.023527] ip6_append_data+0x1b4/0x2d0 [ 682.027604] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 682.032636] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 682.037670] rawv6_sendmsg+0x11cb/0x4720 [ 682.041760] ? rawv6_getsockopt+0x140/0x140 [ 682.046111] ? find_held_lock+0x36/0x1c0 [ 682.050198] ? graph_lock+0x170/0x170 [ 682.054004] ? print_usage_bug+0xc0/0xc0 [ 682.058088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.063640] ? aa_label_sk_perm+0x45b/0x8d0 [ 682.067975] ? aa_profile_af_perm+0x430/0x430 [ 682.072484] ? find_held_lock+0x36/0x1c0 07:42:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1a3, 0x7000000) 07:42:41 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000003, 0x0) [ 682.076562] ? lock_downgrade+0x8f0/0x8f0 [ 682.080740] ? aa_af_perm+0x5a0/0x5a0 [ 682.084557] inet_sendmsg+0x1a1/0x690 [ 682.088370] ? rawv6_getsockopt+0x140/0x140 [ 682.092705] ? inet_sendmsg+0x1a1/0x690 [ 682.096691] ? ipip_gro_receive+0x100/0x100 [ 682.101028] ? apparmor_socket_sendmsg+0x29/0x30 [ 682.105796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.111342] ? security_socket_sendmsg+0x94/0xc0 [ 682.116134] ? ipip_gro_receive+0x100/0x100 [ 682.120470] sock_sendmsg+0xd5/0x120 [ 682.124201] ___sys_sendmsg+0x51d/0x930 [ 682.128185] ? graph_lock+0x170/0x170 [ 682.132001] ? copy_msghdr_from_user+0x580/0x580 [ 682.136771] ? find_held_lock+0x36/0x1c0 [ 682.140848] ? lock_downgrade+0x8f0/0x8f0 [ 682.145024] ? rcu_note_context_switch+0x680/0x680 [ 682.149962] ? check_same_owner+0x340/0x340 [ 682.154305] __sys_sendmmsg+0x240/0x6f0 [ 682.158297] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 682.162625] ? __lock_is_held+0xb5/0x140 [ 682.166713] ? fput+0x130/0x1a0 [ 682.170003] ? do_syscall_64+0x9a/0x820 [ 682.173985] ? do_syscall_64+0x9a/0x820 07:42:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2, 0x10, 0x6, 0x3, 0x20, 0x0, 0x70bd25, 0x25dfdbfe, [@sadb_ident={0x2, 0xb, 0x146e, 0x0, 0x1}, @sadb_key={0x18, 0x8, 0x5a8, 0x0, "6f2a29679701fa4300441b9f4211cc65b7cc4aa462359778673d4b573673e910c28b085c4ff1097e54d6497c08373e717be6ac92c1a72d197469ca4f68b4e9ceaabd19ea0b9a4205f02861ce29a12ea80fd7c6ff32cbd619d48a45feb656681fad99be56da44193e91b543bdd807f05b6b6da7689c60d447d8d9dbbb0aae695964d5878b5fc9a8fd86ee45301c185d4f53dfc02776e508d272493318f53bac8d93807335ffad9ef34b4cbf70752048fb48a95d3c35"}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d2}, @sadb_sa={0x2, 0x1, 0x4d3, 0x4, 0x1, 0x17, 0x1, 0x1}]}, 0x100}}, 0x20000040) [ 682.177968] ? lockdep_hardirqs_on+0x421/0x5c0 [ 682.182562] ? trace_hardirqs_on+0xbd/0x2c0 [ 682.186893] ? __ia32_sys_read+0xb0/0xb0 [ 682.190968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.196335] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 682.201448] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.206997] __x64_sys_sendmmsg+0x9d/0x100 [ 682.211241] do_syscall_64+0x1b9/0x820 [ 682.215147] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 682.220516] ? syscall_return_slowpath+0x5e0/0x5e0 07:42:41 executing program 0 (fault-call:6 fault-nth:19): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x4000000]}}]}, 0x68}}, 0x0) [ 682.225431] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 682.230269] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 682.235290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.240826] ? prepare_exit_to_usermode+0x291/0x3b0 [ 682.245832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 682.250682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.255873] RIP: 0033:0x457099 [ 682.259118] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.278020] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 682.285715] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 682.292967] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 682.300227] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 682.307493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 682.314758] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000012 07:42:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x16000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x69c7, 0x8000, 0x8, 0x6, 0xc2}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)={r3, 0xa}, &(0x7f0000000340)=0x8) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x124) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e0000001000000ac000000000800120002000200000000000000000030000000030300000000000f000000000000000000000000000000000000000000000003000500000000011333d3252d3885000000008fa1f300000000000000000000000047228ef561f38bf2e02d87e18500ea00000000000000000000000000"], 0x80}}, 0x0) [ 682.508838] XFS (loop3): Invalid superblock magic number [ 682.573746] FAULT_INJECTION: forcing a failure. [ 682.573746] name failslab, interval 1, probability 0, space 0, times 0 [ 682.585172] CPU: 1 PID: 21261 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 682.593676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.603035] Call Trace: [ 682.605647] dump_stack+0x1c9/0x2b4 [ 682.609301] ? dump_stack_print_info.cold.2+0x52/0x52 [ 682.614527] should_fail.cold.4+0xa/0x11 [ 682.618621] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 682.623741] ? __save_stack_trace+0x8d/0xf0 [ 682.628102] ? graph_lock+0x170/0x170 [ 682.631924] ? save_stack+0x43/0xd0 [ 682.635573] ? find_held_lock+0x36/0x1c0 [ 682.639665] ? __lock_is_held+0xb5/0x140 [ 682.643759] ? check_same_owner+0x340/0x340 [ 682.648109] ? mark_held_locks+0xc9/0x160 [ 682.652284] ? rcu_note_context_switch+0x680/0x680 [ 682.657255] ? kmem_cache_alloc_node+0x217/0x720 [ 682.662297] __should_failslab+0x124/0x180 [ 682.666551] should_failslab+0x9/0x14 [ 682.670371] kmem_cache_alloc_node_trace+0x259/0x720 [ 682.675505] __kmalloc_node_track_caller+0x33/0x70 [ 682.680458] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 682.685237] __alloc_skb+0x155/0x770 [ 682.688969] ? skb_scrub_packet+0x490/0x490 [ 682.693316] ? find_held_lock+0x36/0x1c0 [ 682.697401] __ip6_append_data.isra.47+0x27a4/0x3600 [ 682.702513] ? lock_downgrade+0x8f0/0x8f0 [ 682.706681] ? kasan_check_read+0x11/0x20 [ 682.710847] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 682.715876] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 682.720564] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 682.724904] ? dst_output+0x180/0x180 [ 682.728728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.734277] ? ip6_setup_cork+0x120b/0x1ac0 [ 682.738626] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 682.743568] ? mark_held_locks+0xc9/0x160 [ 682.747735] ? __local_bh_enable_ip+0x161/0x230 [ 682.752413] ? __local_bh_enable_ip+0x161/0x230 [ 682.757119] ? lockdep_hardirqs_on+0x421/0x5c0 [ 682.761710] ? trace_hardirqs_on+0xbd/0x2c0 [ 682.766036] ? lock_release+0x9f0/0x9f0 [ 682.770020] ? lock_sock_nested+0xe7/0x120 [ 682.774267] ip6_append_data+0x1b4/0x2d0 [ 682.778341] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 682.783371] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 682.788397] rawv6_sendmsg+0x11cb/0x4720 [ 682.792483] ? rawv6_getsockopt+0x140/0x140 [ 682.796824] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 682.801672] ? print_usage_bug+0xc0/0xc0 [ 682.806108] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 682.810957] ? graph_lock+0x170/0x170 [ 682.814760] ? print_usage_bug+0xc0/0xc0 [ 682.818832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.824379] ? aa_label_sk_perm+0x45b/0x8d0 [ 682.828718] ? aa_profile_af_perm+0x430/0x430 [ 682.833217] ? find_held_lock+0x36/0x1c0 [ 682.837297] ? lock_downgrade+0x8f0/0x8f0 [ 682.841472] ? aa_af_perm+0x5a0/0x5a0 [ 682.845289] inet_sendmsg+0x1a1/0x690 [ 682.849107] ? rawv6_getsockopt+0x140/0x140 [ 682.853435] ? inet_sendmsg+0x1a1/0x690 [ 682.857416] ? ipip_gro_receive+0x100/0x100 [ 682.862205] ? apparmor_socket_sendmsg+0x29/0x30 [ 682.866972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.872518] ? security_socket_sendmsg+0x94/0xc0 [ 682.877281] ? ipip_gro_receive+0x100/0x100 [ 682.881614] sock_sendmsg+0xd5/0x120 [ 682.885339] ___sys_sendmsg+0x51d/0x930 [ 682.889317] ? graph_lock+0x170/0x170 [ 682.893131] ? copy_msghdr_from_user+0x580/0x580 [ 682.897905] ? find_held_lock+0x36/0x1c0 [ 682.901984] ? lock_downgrade+0x8f0/0x8f0 [ 682.906158] ? rcu_note_context_switch+0x680/0x680 [ 682.911102] ? check_same_owner+0x340/0x340 [ 682.915452] __sys_sendmmsg+0x240/0x6f0 [ 682.919446] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 682.923774] ? __lock_is_held+0xb5/0x140 [ 682.927862] ? fput+0x130/0x1a0 [ 682.931149] ? do_syscall_64+0x9a/0x820 [ 682.935134] ? do_syscall_64+0x9a/0x820 [ 682.939119] ? lockdep_hardirqs_on+0x421/0x5c0 [ 682.943707] ? trace_hardirqs_on+0xbd/0x2c0 [ 682.948037] ? __ia32_sys_read+0xb0/0xb0 [ 682.952142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.957514] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 682.962628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.968184] __x64_sys_sendmmsg+0x9d/0x100 [ 682.972429] do_syscall_64+0x1b9/0x820 [ 682.976321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 682.981696] ? syscall_return_slowpath+0x5e0/0x5e0 [ 682.986645] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 682.991667] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 682.996687] ? recalc_sigpending_tsk+0x180/0x180 [ 683.001448] ? kasan_check_write+0x14/0x20 [ 683.005695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 683.010561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.015758] RIP: 0033:0x457099 [ 683.018960] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.037864] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 683.045582] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 683.052858] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 683.060128] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 683.067400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 683.074670] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000013 07:42:42 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1000000000000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") write$P9_RWALK(r0, &(0x7f0000000180)={0x8b, 0x6f, 0x1, {0xa, [{0x476a62a57c9d894f, 0x1, 0x3}, {0x96, 0x1, 0x7}, {0x40, 0x0, 0x4}, {0x41, 0x1, 0x7}, {0xc0, 0x4}, {0x4, 0x0, 0x3}, {0x2, 0x1, 0x8}, {0x57, 0x0, 0x8}, {0x4, 0x1, 0x5}, {0x10, 0x4, 0x3}]}}, 0x8b) write$P9_RLERROR(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="0e000000070400000066643f3300"], 0xe) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000040), 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) 07:42:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x2, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x200000d3, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x0, 0x19, 0x0, @in6={0xa, 0x4e20, 0xfffffffffffffffe, @dev={0xfe, 0x80, [], 0x14}, 0x8}, @in6={0xa, 0x4e22, 0x400, @empty, 0xf198}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2]}}]}, 0x68}}, 0x0) 07:42:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x23, 0x7000000) 07:42:42 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000009, 0x0) 07:42:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd403}) 07:42:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:42 executing program 0 (fault-call:6 fault-nth:20): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 683.294568] XFS (loop3): unknown mount option []. [ 683.322215] FAULT_INJECTION: forcing a failure. [ 683.322215] name failslab, interval 1, probability 0, space 0, times 0 [ 683.333626] CPU: 1 PID: 21300 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 683.342121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.351480] Call Trace: [ 683.354112] dump_stack+0x1c9/0x2b4 [ 683.357764] ? dump_stack_print_info.cold.2+0x52/0x52 [ 683.362967] ? graph_lock+0x170/0x170 [ 683.366794] should_fail.cold.4+0xa/0x11 [ 683.370880] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 683.376001] ? print_usage_bug+0xc0/0xc0 [ 683.380108] ? graph_lock+0x170/0x170 [ 683.383935] ? find_held_lock+0x36/0x1c0 [ 683.388022] ? __lock_is_held+0xb5/0x140 [ 683.392125] ? check_same_owner+0x340/0x340 [ 683.396472] ? rcu_note_context_switch+0x680/0x680 [ 683.401431] __should_failslab+0x124/0x180 [ 683.405688] should_failslab+0x9/0x14 [ 683.409509] kmem_cache_alloc_node+0x256/0x720 [ 683.414127] __alloc_skb+0x119/0x770 [ 683.417854] ? skb_scrub_packet+0x490/0x490 [ 683.422208] ? find_held_lock+0x36/0x1c0 [ 683.426300] __ip6_append_data.isra.47+0x27a4/0x3600 [ 683.431412] ? lock_downgrade+0x8f0/0x8f0 [ 683.435581] ? kasan_check_read+0x11/0x20 [ 683.439755] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 683.444787] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 683.449484] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 683.453821] ? dst_output+0x180/0x180 [ 683.457658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.463204] ? ip6_setup_cork+0x120b/0x1ac0 [ 683.467555] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 683.472505] ? mark_held_locks+0xc9/0x160 [ 683.476680] ? __local_bh_enable_ip+0x161/0x230 [ 683.481366] ? __local_bh_enable_ip+0x161/0x230 [ 683.486055] ? lockdep_hardirqs_on+0x421/0x5c0 [ 683.490663] ? trace_hardirqs_on+0xbd/0x2c0 [ 683.494998] ? lock_release+0x9f0/0x9f0 [ 683.498986] ? lock_sock_nested+0xe7/0x120 [ 683.503236] ip6_append_data+0x1b4/0x2d0 [ 683.507313] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 683.512345] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 683.517373] rawv6_sendmsg+0x11cb/0x4720 07:42:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x40000004}) 07:42:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1b9, 0x7000000) 07:42:42 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000016, 0x0) 07:42:42 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000013, 0x0) [ 683.521460] ? rawv6_getsockopt+0x140/0x140 [ 683.525792] ? find_held_lock+0x36/0x1c0 [ 683.529874] ? graph_lock+0x170/0x170 [ 683.533681] ? print_usage_bug+0xc0/0xc0 [ 683.537758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 683.543312] ? aa_label_sk_perm+0x45b/0x8d0 [ 683.547655] ? aa_profile_af_perm+0x430/0x430 [ 683.552161] ? find_held_lock+0x36/0x1c0 [ 683.556254] ? lock_downgrade+0x8f0/0x8f0 [ 683.560432] ? aa_af_perm+0x5a0/0x5a0 [ 683.564249] inet_sendmsg+0x1a1/0x690 [ 683.568065] ? rawv6_getsockopt+0x140/0x140 07:42:42 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xfffffffffffffffc, 0x0) r2 = socket$inet6(0xa, 0x80000000000005, 0x6) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000140)={0xf9, "7149c6ed992d8dc0ce3f1c04e0e3dca79c0e3d93c0c7fc3fa3e43dc92d2413b4b13f9ca789dc28983262c877f97fb5e8e4a0630081c94a5ae307b7fa624e53c808242746768584de1906f069d831fcdca69a1b21bde1c2a9f1aea5e80dc5f46a40939735171b3d17361788aabae3631fbc1888a1e75b06be664f0613bde68da5eb5910029df60c51f13c9a45c273969973e1386cdae45a0222d5be2babf5b07e3886fc308318978cce1d5d9b2e1c7d98ad79e8c0e3645134b8fe10064736b110e3cdd48e8069d10f5007cdaf07ea814fab86dbde82d43cd12b0a75056bf34c1e09d5e84c7e83367402b4d82beee7bc0c817f7561b0aca11a18"}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000008000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000200)="0f60350000000066b861000f00d0c7442400c2000000c74424020e000000c7442406000000000f011c24c482719a160fba2d100000003f660f6f347b48b8ea000000000000000f23c80f21f8350c00a0000f23f8b8010000000f01d9400f01ca66b8c7000f00d0", 0x67}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000100)={'bond_slave_1\x00', 0x7fff}) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000002c0)={'team_slave_0\x00', @ifru_hwaddr=@broadcast}) ioctl$KVM_RUN(r6, 0xae80, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x7) [ 683.572411] ? inet_sendmsg+0x1a1/0x690 [ 683.576394] ? ipip_gro_receive+0x100/0x100 [ 683.580727] ? apparmor_socket_sendmsg+0x29/0x30 [ 683.585495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.591051] ? security_socket_sendmsg+0x94/0xc0 [ 683.595828] ? ipip_gro_receive+0x100/0x100 [ 683.600164] sock_sendmsg+0xd5/0x120 [ 683.603893] ___sys_sendmsg+0x51d/0x930 [ 683.607877] ? graph_lock+0x170/0x170 [ 683.611685] ? __switch_to_asm+0x34/0x70 [ 683.615754] ? copy_msghdr_from_user+0x580/0x580 [ 683.620518] ? __schedule+0x884/0x1df0 [ 683.624427] ? find_held_lock+0x36/0x1c0 [ 683.628513] ? lock_downgrade+0x8f0/0x8f0 [ 683.632693] ? rcu_note_context_switch+0x680/0x680 [ 683.637642] ? check_same_owner+0x340/0x340 [ 683.641985] __sys_sendmmsg+0x240/0x6f0 [ 683.645979] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 683.650316] ? __lock_is_held+0xb5/0x140 [ 683.654410] ? fput+0x130/0x1a0 [ 683.657706] ? do_syscall_64+0x9a/0x820 [ 683.661694] ? do_syscall_64+0x9a/0x820 [ 683.665678] ? lockdep_hardirqs_on+0x421/0x5c0 07:42:43 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000012, 0x0) [ 683.670270] ? trace_hardirqs_on+0xbd/0x2c0 [ 683.674609] ? __ia32_sys_read+0xb0/0xb0 [ 683.678687] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.684065] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 683.689191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 683.694746] __x64_sys_sendmmsg+0x9d/0x100 [ 683.698996] do_syscall_64+0x1b9/0x820 [ 683.702902] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 683.708276] ? syscall_return_slowpath+0x5e0/0x5e0 [ 683.713220] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 683.718249] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 683.723275] ? recalc_sigpending_tsk+0x180/0x180 [ 683.728281] ? kasan_check_write+0x14/0x20 [ 683.732531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 683.737393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.742588] RIP: 0033:0x457099 [ 683.745799] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.764704] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 683.772420] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 683.779692] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 683.786962] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 683.794231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 683.801498] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000014 [ 683.842293] XFS (loop3): unknown mount option []. 07:42:43 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000000f, 0x0) 07:42:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1ce, 0x7000000) 07:42:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000240)=0x60) getsockopt$nfc_llcp(r1, 0x118, 0x4, &(0x7f0000000280)=""/255, 0xff) r2 = socket$key(0xf, 0x3, 0x2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl(r1, 0x0, &(0x7f0000000380)="f2b08cc73ebdcf35bc51f4f11c857e561fea53b32b9b0835bafe7bc253b10cde88662dbb615bcb48b0cce210b5f7fc6df101d2afa71ab5f739967f6f02d51de5d8aac8e17022437e0fced4776d54541fd7bc86a68dd47e52e3b6d2a7eb88629c6346") ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f00000000c0)) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d76b90000aed5aac5bda8d45b16d63d100000000000000000000000030006000000400002000000e00000010000040000000000080012000418beb3ce4ed33fd47802000200000000000000000030000000030300000000000f0000000000000000000000000000000000000000000000000000030005000000000002000000e000000100000000000011d92e6f7ec0781e46ed14a6632ab65654fa3403bf7400000000000000000000"], 0x80}}, 0x0) finit_module(r0, &(0x7f0000000400)='em1em1system', 0x1) 07:42:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x200) mkdirat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x1ff) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000001c0)=""/26) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000400200000063a22395919076d2e20688c320d839e3b02d444d922e2463e000000100000000000000000800120002000200080000000000000030000000030300000000000f0000000004001382800000000000000000000000000001ac1414bb000000000000000000000000030005000000"], 0x80}}, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0xc0101) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000040)=""/41) flistxattr(r3, &(0x7f0000000180)=""/28, 0x1c) 07:42:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x1000000]}}]}, 0x68}}, 0x0) 07:42:43 executing program 0 (fault-call:6 fault-nth:21): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x3f00}) [ 684.009894] Unknown ioctl -2146950137 [ 684.049698] Unknown ioctl -2147199744 07:42:43 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000015, 0x0) 07:42:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) finit_module(r0, &(0x7f0000000000)='\x00', 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 684.104734] Unknown ioctl -2146950137 [ 684.104751] Unknown ioctl -2147199744 [ 684.129185] FAULT_INJECTION: forcing a failure. [ 684.129185] name failslab, interval 1, probability 0, space 0, times 0 [ 684.140496] CPU: 1 PID: 21361 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 684.148997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.158387] Call Trace: [ 684.160994] dump_stack+0x1c9/0x2b4 [ 684.164647] ? dump_stack_print_info.cold.2+0x52/0x52 [ 684.169853] ? graph_lock+0x170/0x170 [ 684.173679] should_fail.cold.4+0xa/0x11 [ 684.177764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 684.182883] ? print_usage_bug+0xc0/0xc0 [ 684.186973] ? graph_lock+0x170/0x170 [ 684.190793] ? find_held_lock+0x36/0x1c0 [ 684.194872] ? __lock_is_held+0xb5/0x140 [ 684.198965] ? check_same_owner+0x340/0x340 07:42:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xa3, 0x7000000) 07:42:43 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000080000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 684.203307] ? rcu_note_context_switch+0x680/0x680 [ 684.208260] __should_failslab+0x124/0x180 [ 684.212506] should_failslab+0x9/0x14 [ 684.216315] kmem_cache_alloc_node+0x256/0x720 [ 684.220918] __alloc_skb+0x119/0x770 [ 684.224659] ? skb_scrub_packet+0x490/0x490 [ 684.229042] ? find_held_lock+0x36/0x1c0 [ 684.233149] __ip6_append_data.isra.47+0x27a4/0x3600 [ 684.238268] ? lock_downgrade+0x8f0/0x8f0 [ 684.242438] ? kasan_check_read+0x11/0x20 [ 684.246618] ? rawv6_mh_filter_unregister+0xe0/0xe0 07:42:43 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000002, 0x0) [ 684.251657] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 684.256370] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 684.260708] ? dst_output+0x180/0x180 [ 684.264534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.270096] ? ip6_setup_cork+0x120b/0x1ac0 [ 684.274465] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 684.279412] ? mark_held_locks+0xc9/0x160 [ 684.283586] ? __local_bh_enable_ip+0x161/0x230 [ 684.288285] ? __local_bh_enable_ip+0x161/0x230 [ 684.292981] ? lockdep_hardirqs_on+0x421/0x5c0 [ 684.297580] ? trace_hardirqs_on+0xbd/0x2c0 [ 684.301924] ? lock_release+0x9f0/0x9f0 [ 684.305912] ? lock_sock_nested+0xe7/0x120 [ 684.310158] ip6_append_data+0x1b4/0x2d0 [ 684.314231] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 684.319266] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 684.324295] rawv6_sendmsg+0x11cb/0x4720 [ 684.328384] ? rawv6_getsockopt+0x140/0x140 [ 684.332726] ? find_held_lock+0x36/0x1c0 [ 684.336812] ? graph_lock+0x170/0x170 [ 684.340633] ? print_usage_bug+0xc0/0xc0 [ 684.344762] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.350311] ? aa_label_sk_perm+0x45b/0x8d0 07:42:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x112, 0x7000000) [ 684.354648] ? aa_profile_af_perm+0x430/0x430 [ 684.359157] ? find_held_lock+0x36/0x1c0 [ 684.363236] ? lock_downgrade+0x8f0/0x8f0 [ 684.367391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 684.372181] ? aa_af_perm+0x5a0/0x5a0 [ 684.376004] inet_sendmsg+0x1a1/0x690 [ 684.379819] ? rawv6_getsockopt+0x140/0x140 [ 684.384155] ? inet_sendmsg+0x1a1/0x690 [ 684.388138] ? ipip_gro_receive+0x100/0x100 [ 684.392476] ? apparmor_socket_sendmsg+0x29/0x30 [ 684.397247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:42:43 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xb605000000000000) [ 684.402802] ? security_socket_sendmsg+0x94/0xc0 [ 684.407565] ? ipip_gro_receive+0x100/0x100 [ 684.411911] sock_sendmsg+0xd5/0x120 [ 684.415640] ___sys_sendmsg+0x51d/0x930 [ 684.419632] ? graph_lock+0x170/0x170 [ 684.423452] ? copy_msghdr_from_user+0x580/0x580 [ 684.428226] ? find_held_lock+0x36/0x1c0 [ 684.432310] ? lock_downgrade+0x8f0/0x8f0 [ 684.436478] ? rcu_note_context_switch+0x680/0x680 [ 684.441419] ? check_same_owner+0x340/0x340 [ 684.445765] __sys_sendmmsg+0x240/0x6f0 [ 684.449778] ? __ia32_sys_sendmsg+0xb0/0xb0 07:42:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xf6, 0x7000000) [ 684.454127] ? __lock_is_held+0xb5/0x140 [ 684.458221] ? fput+0x130/0x1a0 [ 684.461511] ? do_syscall_64+0x9a/0x820 [ 684.465498] ? do_syscall_64+0x9a/0x820 [ 684.469480] ? lockdep_hardirqs_on+0x421/0x5c0 [ 684.474072] ? trace_hardirqs_on+0xbd/0x2c0 [ 684.478419] ? __ia32_sys_read+0xb0/0xb0 [ 684.482496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.487867] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 684.492988] __x64_sys_sendmmsg+0x9d/0x100 [ 684.497233] do_syscall_64+0x1b9/0x820 [ 684.501135] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 684.506509] ? syscall_return_slowpath+0x5e0/0x5e0 [ 684.511454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 684.516312] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 684.521341] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 684.526376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.531925] ? prepare_exit_to_usermode+0x291/0x3b0 [ 684.536958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 684.541825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.547019] RIP: 0033:0x457099 07:42:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x18f, 0x7000000) [ 684.550227] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.569133] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 684.576856] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 684.584129] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 684.591405] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 684.598715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:42:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2000000]}}]}, 0x68}}, 0x0) [ 684.605990] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000015 07:42:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) recvfrom(r2, &(0x7f0000000140)=""/98, 0x62, 0x2020, &(0x7f0000000240)=@in={0x2, 0x4e20, @local}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@local, r3}, 0x14) [ 684.662984] XFS (loop3): Invalid superblock magic number 07:42:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x2000000000000044, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:44 executing program 0 (fault-call:6 fault-nth:22): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:44 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xf5ffffff00000000) 07:42:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2000]}}]}, 0x68}}, 0x0) 07:42:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd80c000000000000}) 07:42:44 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x17a, 0x7000000) 07:42:44 executing program 5: r0 = socket$inet6(0xa, 0x5, 0xfffffffffffffffd) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x803) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@local, 0x5a, r1}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@remote, 0x11, r1}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 07:42:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffff7b02e89, 0x40) sendmmsg$alg(r2, &(0x7f0000002000)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="5f8b4db2394c9347483a48d71f2e63e318a4058f82960f01bad389aeb047d121292bdac4778375ef38e450380d1f039d88a758017c0158bd44bc1c321694573cec4c2393778559de0a30c5296e3f96749a59f59ed5e5b3f2e7c59e668da3551e9693f4e7a302fcaa4bdc0cd81508358d5509833ade6f301c409ffe9c127784326d53bf31dc6def3a4bcc7fee50a1fd5c81d883c7a1413dfcde57a2f168f11942d1fbba0bfbf99f501711c02767de066f41e64a4d48af70c2cf870ff6eb9800916c7ad11a1c7f1021eb2f93d6924186d02a52e59af30fc9273d05fe1806dd4f5e7fb795fb26e69d4b50785407681e5be4a7cd2edd71cc", 0xf6}, {&(0x7f0000000140)="639019396f944457bdf43b2d823627c0c2fb801f51cdc7230b1d64b7ec0c23e93c670154cb9d2d7ee49ae32486bb88fc14e61269cf55fbe8a6864ae6d8d19959b15adb7626f1eab63f1561724fb9c2312b4b96b8d368ca944b5db4c1dbb0408a95de7ea5aa9ee0b8c04b8fe72674e0fe9bad45d8840b43c323d946b7ddec", 0x7e}, {&(0x7f0000000340)="cd3684a1e83bcaa4da9a104494079aa8bce3dd8b9bab575455a8583c89d1855f4e00dc8a529bf8e57ba75c32d1b3cec05e2bb488ca535256d44333c4a551f2a3f5cb9f12c1b79c8534dd7b6c12724cd3e552c50f053c4e258f", 0x59}, {&(0x7f00000003c0)="956389f9dd3cba4bee7a3a75f637509b4abfba5d33282355c11b9c0d5693707d3fa0c6f69dbbaf2ca50f695aa2887a3cd79ca9c0fa9b60058ab0fdb328a472427f6e5ec435f59e3a622ddf55e6c2c0691afbaa32b6d33899185ceb214f22c84cdd25e2d135e2de5915309ed337258ebfd2343ec1b187f65334414619a77784663c568f7ac592cb08cac755e1fe97005423f97bd36cfdad088eb684", 0x9b}], 0x4, 0x0, 0x0, 0x840}, {0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000480)="8daaa5356e9ee750c92ccc2438dd92db56883f70e323a5569c6901d9c3b7dad27834c788f77ae8cd2eb11a93014a88bd3f73ffedf5ee83508c1024b9796d27ecce0aa660e6463e78462f6ff12dfe7b0ad4d59f17c020c0134cac8953124a", 0x5e}], 0x1, &(0x7f0000000500)=[@assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x48, 0x4000}, {0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)="798d9728165c4f9c193c9792175718528d0fce56b2871d0499b69be6f6b4a7eb37ebffa624b8b7e6346196f62bcece442482646a9df29ac836250a8d80c5f0dad18a915700a94bbdb187f89813811c760965982d9e36d89e01393ebdfecdb0a9f1597a5197cedbebf78a978bfe3a55d5fabb8dfd188afbe5e499d0eed37345b5830d770c35e3d5c1c94a350c9b1fa27454e17f25439b99b3", 0x98}], 0x1, &(0x7f0000000680)=[@iv={0x110, 0x117, 0x2, 0xf5, "e8ce299bc525d593b908014872f5b0f88417a6552b33050e4d93a6e0fe5bd3552eaaa8def2a529e0c92d68de54b8ae407d6b7701f1225427b2ff70da4d6a83c08df5563284fc4bfa35ffacbc116abb9bbad157e0b323fbce2e4c8466f598c7e5b6afa766ba5b407e0ac5b83053a155ce6599ca4a4165e975880325e48fe9e9ec9a4c163260c0faa752bc175b6e386b2b9123584a5d4b790a0b7cf63a9de41bba3ec7e0b9e6ed647a2e551424a0450376fd41751c494bb534d16e1372a294a56a158df448065e233bf288caa649a718a1552be5c8f62312926a3bf0813b953f27dec7177929ecc14d7f991f47c7b044ba36061f9d08"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}, @op={0x18}, @iv={0x90, 0x117, 0x2, 0x77, "0c43134361131a768efccf04e7871aaf5b3589b80f576f097de3abbbadcaa1199b70a8543dd1ec2ffecbd76e7995dd7636f695d976fd0ea3629f2fa5aa9e853faa160fbc086b1157222357bddaddd58b87eb2df48d61f1563a59ba76dad6a0a7814beeed13b0b2e460c2fabba6c83b4a38b81d4890d81f"}], 0x200, 0x4040000}, {0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000880)="76302764e17b86248ebf75b22692b7732e582c3eddcfe19d6f96e802d6c738ad2df272251cb0b69a16f74ca80b0dbc95f303400e77ce0c4560a804d0ebaaaa04baecbdbd", 0x44}, {&(0x7f0000000900)="9eb8e541408b3f658c405bc08c8c16e46f1bdcc9799f9d877866630d6c03497be4c6de5c15b5bf2ad4477634940890b0f509cb8aa96895537abba34b614ad0585fa599cf167fb14a00111011bc0cd0084e66d2c272123af3c188f2642c6ac40be0c445a8b085b36c5f7bc882866f3c76d80d514e56a7c16c0330f818716284e1c472404351b3224fa5ebb2f0393bf2e7492d5093e5d6d3fae1ddec127998ac668cbf852869468780a7c142425a5bc35368239b6ff6a4288d70cb890d4496f39b1258", 0xc2}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="76ac23a9789b70cca5dd0faee637b6f8508ac6b9c20f395935d8f00a6e95492b3abed32279451b8505db0ed09fa6a030af243ec5695ee7607ffcb3fa6b0b66384fff09bfeb70fc75b83acbbd70a3d4adca3ad5169bf822fab610f548e43dd2d10ade9b5144fbe2a9e0379ccbb703b9a5694b41e00db2aca3857276a7aa587ccd3fe7155e307727cecd166bd8c7c2432668fed508702eaaad7fdb76cdd15ee37999c5845a4578e15195aa4209715e34a8b9fb5e", 0xb3}, {&(0x7f0000001ac0)="20de3b84a9ba8905f4dc7acf67c9dcfccdb2c516e19bc9776647286288300c699d0002c5cb4961968444575eeccc5141d9e7daea9457095f805381746f984dfa7acb0039b839ff8842bf869c9231be7a4fa884cc07ce375ee20813dd780595a412e98dd79039de4f6680e5654e486fc646513341852080abdbc46697a92374a628", 0x81}], 0x5, &(0x7f0000001c00)=[@assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0xa0, 0x117, 0x2, 0x8c, "9d183649897335149f30bfc36bfaae066f2eaf5988f5cae3637b35857f23dc453feeeee547c154a18d352f6c55c303d831ad65a5bc0a8d264c048819d364e1519ff432d3c215d485c19cbc46d0c5539af7f02fcdc3dab872b0fcc11ecef2aa003cd072309662748afaa9b433f43f7039e333306b3aa0475f6a7e17dcce49ced61aacaf4481ee9a7179f08045"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xffff}, @assoc={0x18, 0x117, 0x4, 0xf8c}], 0x118, 0x4001}, {0x0, 0x0, &(0x7f0000001f80)=[{&(0x7f0000001d40)="10591cd505583506b3b4d30225abc6856fb2a8e398464e96203e0e82f2d536dd414a2df80675b05bd945225ed17cb21954eecc000a7ddb683fa03b5abade3fed4f68d33c5170d58703b2db45590b84fd31f312a6a73f0ccc65e78ee3f9b5c12d7163a66390e5ef19815b414de98b4b54683b066b7aac4d3d5d40c0abc233ee41ef488f5c357a18def954dc0b7fdc4c0852e59bdf89dd0cbb364562abbed57143", 0xa0}, {&(0x7f0000001e00)="4c42d19ca82d3ecd7c0cd5c0a57b3141c2c85231bcec3e67af653cebd2d7bac614a5b64dc6bb15d3344594d8450677ef21", 0x31}, {&(0x7f0000001e40)="d0fc223e5aedc9b5bff8e980f6715b8d2256efda6a68b06006de", 0x1a}, {&(0x7f0000001e80)="0b31cf931746c93caeaaeef6c94938c5a4da6ef9cbbf63aeb902a55cfb56d1fe279a037810251208abdfa724b58533c8c2d4cbf851aa44025f6da59ea61e47fbabcb8c92f6a2bc89a6f9df3b4a605769010d43a7b2a137bf9e123c2bb9a1a9ac242b5b6ade0c115c98db80f3967eee8d72a878c505646fd1a27f51545f30ddf60b15b2f6e7b8b92355fc69c459fee019540783dd773c8f272ca8993c8a5e0fd6ae68bb9dff7affb8cfe574f52bc68cc3e930e69bb95afd2ede841c334dbed7bee95b07e531a073e21b3d95841076e04731f7028b45e1084a12e0727052fa960c5393a5330d7d6975c27ac3459aca7ac852c780c08c", 0xf5}], 0x4, &(0x7f0000001fc0)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}], 0x5, 0x20000000) 07:42:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x68}}, 0x0) [ 684.985938] XFS (loop3): Invalid superblock magic number 07:42:44 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000540)=0xc) syz_open_procfs(r2, &(0x7f0000000580)='fd/3\x00') ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000000)={0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}]}) 07:42:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd80c}) 07:42:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x180, 0x7000000) 07:42:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x1000000]}}]}, 0x68}}, 0x0) 07:42:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='projid_map\x00') sendmsg$nl_netfilter(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10400080}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x1264, 0x14, 0x4, 0x8, 0x70bd27, 0x25dfdbfc, {0xa, 0x0, 0x1}, [@nested={0x1250, 0xd, [@generic="321fc3f12f41dc1d772d4c889de37811f2e08a89c74dfb9810d98037fdc4170b5ac036e0bcda177c5a1646d491f259251a76be3c9813dcdeecb592530eda58465d4d9f32bdc8e741ad40edc635294875ff8db52e5a8c8b3d95873d686cb147e34e8bb4527170258fcb7cfea0cbee692d020e3a3994529a16eedcfaf90423a4e87c6baec1f846f4a303425df22c12316645657e276f217618d59c531ab2b55692261c6c29716948952dc365ec63e43c98eef0ef6ecc895f04f7b37b7b0bd65608e001370b1a6a4f08adbb15567e8474dcb4f9174021a1c6100ab8d5d6cb4a56386818211e918ba58e1554dddfa7273b19ee", @generic="e785d99518ddbddc30e9bd77e8", @generic="90785ad40d4e904819503fd651db36318ce5b37379582583b543d588a9b5eb", @generic="c42fd44646b83935891e6a", @generic="a92c4091f09153618c001ed573b9282f5054c4721b7b53cf5214e90f4dea3c438326", @generic="e606deb90b711a772b1aa2ebfd40383f3dd107a87ebf890c325bec8366003b300c72a076d8f718f2f3ad5f0939071e3b2bd96d8f8e94489188624e187e49ecf99cd1372eafa30c3319b6e78bb131d0e5085c6dcacbf88cc86334", @generic="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", @generic="a766d4f277f9a0180b33d7b0035d2cc8afacde49a232a232660f1741da82eed2c8dbf91a2efbd7db0c1913dbc53e01a168b16a9e2928f2b182f43f79f520f14154b6cdf9b2437b0e1fb12af6d6ee252dc3f747b8de564c2e029f7ed0093fe7e06f9d526a2a776623c9df9151f99773a061b71d1eaec599720858be3827ea4d59202553b8ffbff98d7ecc99da2cba68de14694f4d5c69a33616cceede3d36a40c85d3e0e19707f709"]}]}, 0x1264}, 0x1, 0x0, 0x0, 0x4}, 0x4040) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000001680)={0x0, 0x1, 0x1ff, 0x80000001, 0x8000, 0xffff}, &(0x7f00000016c0)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000001700)={r3, @in6={{0xa, 0x4e21, 0xee, @dev={0xfe, 0x80, [], 0x13}, 0x10}}, 0x67b, 0xfffffffffffffff8, 0x9, 0xfffffffffffffffa, 0xa0}, 0x98) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x9, 0x0, 0x9, 0xfffffffffffffffb, r4}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000001640)=[@in6={0xa, 0x4e24, 0x5, @mcast1, 0x471}], 0x1c) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000015c0), &(0x7f0000001600)=0xb) ioctl$UI_DEV_CREATE(r2, 0x5501) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f009f00000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000100000000"], 0x80}}, 0x0) 07:42:44 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x5, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="028b000f020e000000000700ffffffff4d85d676ae0559320f1eb20e36085f60efa53e6286d35c939f8d000000000000000000c37eb2964a066b95e9a45d9b604684f0be50dabf59c454e3a5e93e6c3303f6fc4b82483df6e4a0b18e96f32268a3d974884173ee5d6e6691febf17e25af37e355fcb058dca7e002262b9e156cb866c729f87e988e9510e82162b"], 0x10}}, 0x10) write$P9_RCLUNK(r0, &(0x7f0000000140)={0x7, 0x79, 0x1}, 0x7) [ 685.183737] XFS (loop3): unknown mount option [ ]. [ 685.252945] XFS (loop3): unknown mount option [ ]. 07:42:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000001, &(0x7f0000000080)="0a5cc80700315f85716770") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f0000000000)=0x54) [ 685.442728] FAULT_INJECTION: forcing a failure. [ 685.442728] name failslab, interval 1, probability 0, space 0, times 0 [ 685.454378] CPU: 0 PID: 21505 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 685.462878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.472238] Call Trace: [ 685.474848] dump_stack+0x1c9/0x2b4 [ 685.478500] ? dump_stack_print_info.cold.2+0x52/0x52 [ 685.483707] ? print_usage_bug+0xc0/0xc0 [ 685.487787] ? print_usage_bug+0xc0/0xc0 [ 685.491878] should_fail.cold.4+0xa/0x11 [ 685.495961] ? group_sched_in+0x17d/0x400 [ 685.500142] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 685.505261] ? print_usage_bug+0xc0/0xc0 [ 685.509347] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 685.514904] ? mark_held_locks+0xc9/0x160 [ 685.519073] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.523857] ? lockdep_hardirqs_on+0x421/0x5c0 [ 685.528431] ? retint_kernel+0x10/0x10 [ 685.532308] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 685.537243] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.542005] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 685.547444] ? find_held_lock+0x36/0x1c0 [ 685.551518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.556287] ? retint_kernel+0x10/0x10 [ 685.560186] ? rcu_note_context_switch+0x680/0x680 [ 685.565129] __should_failslab+0x124/0x180 [ 685.569358] should_failslab+0x9/0x14 [ 685.573152] kmem_cache_alloc_node+0x256/0x720 [ 685.577722] ? graph_lock+0x170/0x170 [ 685.581513] __alloc_skb+0x119/0x770 [ 685.585230] ? skb_scrub_packet+0x490/0x490 [ 685.589553] ? find_held_lock+0x36/0x1c0 [ 685.593610] ? mark_held_locks+0xc9/0x160 [ 685.597751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.602495] __ip6_append_data.isra.47+0x27a4/0x3600 [ 685.607599] ? kasan_check_read+0x11/0x20 [ 685.611750] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 685.616753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.621499] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 685.625809] ? ip6_setup_cork+0x1056/0x1ac0 [ 685.630125] ? write_comp_data+0x70/0x70 [ 685.634187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.639734] ? ip6_setup_cork+0x120b/0x1ac0 [ 685.644056] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 685.648980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.653724] ? retint_kernel+0x10/0x10 [ 685.657610] ip6_append_data+0x1b4/0x2d0 [ 685.661665] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 685.666680] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 685.671687] rawv6_sendmsg+0x11cb/0x4720 [ 685.675744] ? rawv6_getsockopt+0x140/0x140 [ 685.680055] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.684804] ? lockdep_hardirqs_on+0x421/0x5c0 [ 685.689373] ? retint_kernel+0x10/0x10 [ 685.693254] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 685.698182] ? retint_kernel+0x10/0x10 [ 685.702058] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.706819] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 685.712276] ? graph_lock+0x170/0x170 [ 685.716069] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 685.721610] ? aa_label_sk_perm+0x45b/0x8d0 [ 685.725920] ? aa_profile_af_perm+0x430/0x430 [ 685.730399] ? find_held_lock+0x36/0x1c0 [ 685.734450] ? lock_downgrade+0x8f0/0x8f0 [ 685.738594] ? aa_af_perm+0x5a0/0x5a0 [ 685.742402] inet_sendmsg+0x1a1/0x690 [ 685.746196] ? rawv6_getsockopt+0x140/0x140 [ 685.750510] ? inet_sendmsg+0x1a1/0x690 [ 685.754469] ? ipip_gro_receive+0x100/0x100 [ 685.758775] ? apparmor_socket_sendmsg+0x29/0x30 [ 685.763526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.769063] ? security_socket_sendmsg+0x94/0xc0 [ 685.773814] ? ipip_gro_receive+0x100/0x100 [ 685.778128] sock_sendmsg+0xd5/0x120 [ 685.781831] ___sys_sendmsg+0x51d/0x930 [ 685.785788] ? graph_lock+0x170/0x170 [ 685.789574] ? copy_msghdr_from_user+0x580/0x580 [ 685.794318] ? find_held_lock+0x36/0x1c0 [ 685.798378] ? lock_downgrade+0x8f0/0x8f0 [ 685.802516] ? retint_kernel+0x10/0x10 [ 685.806393] ? rcu_note_context_switch+0x680/0x680 [ 685.811325] ? check_same_owner+0x340/0x340 [ 685.815652] __sys_sendmmsg+0x240/0x6f0 [ 685.819620] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 685.823930] ? __lock_is_held+0xb5/0x140 [ 685.828019] ? fput+0x130/0x1a0 [ 685.831304] ? do_syscall_64+0x9a/0x820 [ 685.835289] ? do_syscall_64+0x9a/0x820 [ 685.839273] ? lockdep_hardirqs_on+0x421/0x5c0 [ 685.843852] ? trace_hardirqs_on+0xbd/0x2c0 [ 685.848170] ? __ia32_sys_read+0xb0/0xb0 [ 685.852227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.857588] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 685.862682] __x64_sys_sendmmsg+0x9d/0x100 [ 685.866910] do_syscall_64+0x1b9/0x820 [ 685.870794] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 685.876156] ? syscall_return_slowpath+0x5e0/0x5e0 [ 685.881072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 685.885915] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 685.890919] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 685.895920] ? prepare_exit_to_usermode+0x291/0x3b0 [ 685.900925] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 685.905764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.910952] RIP: 0033:0x457099 [ 685.914135] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.933044] RSP: 002b:00007f6632bf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 07:42:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x4000000000000000}) 07:42:45 executing program 4: r0 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000000)=0x60, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:45 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x8dffffff) 07:42:45 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d000000000000000000000000030006000000000002000000e000000100000000000000000812120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x68}}, 0x0) 07:42:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002f80)={0x0, @multicast2}, &(0x7f0000002fc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000003000)={'vcan0\x00', r3}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e0000001000000000000000008001200020002000000000000000000300000000328e1fd0300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 07:42:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xbd, 0x7000000) 07:42:45 executing program 0 (fault-call:6 fault-nth:23): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 685.940746] RAX: ffffffffffffffda RBX: 00007f6632bf46d4 RCX: 0000000000457099 [ 685.948007] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 685.955275] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 685.962570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 685.969842] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000016 07:42:45 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80080) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000240)={0x76, {{0xa, 0x4e21, 0x7fffffff, @local, 0x9}}}, 0x88) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/11, 0xb) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2000000000000000]}}]}, 0x68}}, 0x0) 07:42:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1c7, 0x7000000) [ 686.097767] XFS (loop3): Invalid superblock magic number [ 686.108058] FAULT_INJECTION: forcing a failure. [ 686.108058] name failslab, interval 1, probability 0, space 0, times 0 [ 686.119489] CPU: 1 PID: 21551 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 686.127990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.137345] Call Trace: [ 686.139954] dump_stack+0x1c9/0x2b4 [ 686.143613] ? dump_stack_print_info.cold.2+0x52/0x52 [ 686.148840] should_fail.cold.4+0xa/0x11 [ 686.152920] ? __kernel_text_address+0xd/0x40 [ 686.157444] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 686.162574] ? __save_stack_trace+0x8d/0xf0 [ 686.166931] ? graph_lock+0x170/0x170 [ 686.170750] ? save_stack+0x43/0xd0 [ 686.174390] ? kasan_kmalloc+0xc4/0xe0 [ 686.178299] ? find_held_lock+0x36/0x1c0 [ 686.182391] ? __lock_is_held+0xb5/0x140 [ 686.186477] ? check_same_owner+0x340/0x340 [ 686.190813] ? mark_held_locks+0xc9/0x160 [ 686.194981] ? rcu_note_context_switch+0x680/0x680 [ 686.199929] ? kmem_cache_alloc_node+0x217/0x720 [ 686.204707] __should_failslab+0x124/0x180 [ 686.208964] should_failslab+0x9/0x14 [ 686.212783] kmem_cache_alloc_node_trace+0x259/0x720 [ 686.217918] __kmalloc_node_track_caller+0x33/0x70 [ 686.222864] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 686.227645] __alloc_skb+0x155/0x770 [ 686.231387] ? skb_scrub_packet+0x490/0x490 [ 686.235742] ? find_held_lock+0x36/0x1c0 [ 686.239828] __ip6_append_data.isra.47+0x27a4/0x3600 07:42:45 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x700) 07:42:45 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1dc, r1, 0x200, 0x70bd27, 0x9, {}, [{{0x8, 0x1, r2}, {0x1c0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x6, 0xffff, 0x200, 0xfffffffffffffffc}, {0x7f, 0x101, 0x8000, 0x7}, {0x1, 0xa0, 0x8001, 0x8}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xe82}}, {0x8}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x3, 0x7, 0x80, 0x5}, {0x6, 0x153, 0x1ff, 0x6}, {0xffffffffffffffab, 0x7, 0x4, 0x7}, {0x5, 0x6, 0x1, 0x8}, {0x101, 0xffffffff80000000, 0x100000001, 0x1}, {0x3bc4, 0x843, 0xffff, 0x61}, {0x0, 0x10001, 0x1, 0x1000}, {0x40, 0xffffffff, 0xff}, {0x1, 0x1, 0x400, 0x1}]}}}]}}]}, 0x1dc}}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4(r0, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80, 0x80000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000300)=0x8, 0x8) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) r3 = dup3(r0, r1, 0x80000) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x6}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22}}}, 0x84) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030100000000000f0000000000000000000000000000000000000001ac1414bb220000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) r6 = fcntl$getown(r2, 0x9) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x3, 0x100000000, 0x5, 0x4, 0x0, 0x70bd28, 0x25dfdbfb, [@sadb_x_sa2={0x2, 0x13, 0xffff, 0x0, 0x0, 0x70bd29, 0x3505}]}, 0x20}}, 0x0) write$cgroup_pid(r5, &(0x7f0000000340)=r6, 0x12) 07:42:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xe9, 0x7000000) [ 686.244950] ? lock_downgrade+0x8f0/0x8f0 [ 686.249125] ? kasan_check_read+0x11/0x20 [ 686.253315] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 686.258348] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 686.263043] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 686.267390] ? dst_output+0x180/0x180 [ 686.271223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.276778] ? ip6_setup_cork+0x120b/0x1ac0 [ 686.281137] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 686.286092] ? mark_held_locks+0xc9/0x160 [ 686.290253] ? __local_bh_enable_ip+0x161/0x230 [ 686.294935] ? __local_bh_enable_ip+0x161/0x230 [ 686.299626] ? lockdep_hardirqs_on+0x421/0x5c0 [ 686.304231] ? trace_hardirqs_on+0xbd/0x2c0 [ 686.308562] ? lock_release+0x9f0/0x9f0 [ 686.312558] ? lock_sock_nested+0xe7/0x120 [ 686.316806] ip6_append_data+0x1b4/0x2d0 [ 686.320909] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 686.325944] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 686.330976] rawv6_sendmsg+0x11cb/0x4720 [ 686.335063] ? rawv6_getsockopt+0x140/0x140 [ 686.339416] ? find_held_lock+0x36/0x1c0 [ 686.343502] ? graph_lock+0x170/0x170 [ 686.347318] ? print_usage_bug+0xc0/0xc0 [ 686.351399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.356953] ? aa_label_sk_perm+0x45b/0x8d0 [ 686.361294] ? aa_profile_af_perm+0x430/0x430 [ 686.365798] ? find_held_lock+0x36/0x1c0 [ 686.369874] ? lock_downgrade+0x8f0/0x8f0 [ 686.374055] ? aa_af_perm+0x5a0/0x5a0 [ 686.377885] inet_sendmsg+0x1a1/0x690 [ 686.381700] ? rawv6_getsockopt+0x140/0x140 [ 686.386033] ? inet_sendmsg+0x1a1/0x690 [ 686.390022] ? ipip_gro_receive+0x100/0x100 [ 686.394385] ? apparmor_socket_sendmsg+0x29/0x30 07:42:45 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000140)=&(0x7f00000000c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 686.399183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.404732] ? security_socket_sendmsg+0x94/0xc0 [ 686.409498] ? ipip_gro_receive+0x100/0x100 [ 686.413833] sock_sendmsg+0xd5/0x120 [ 686.417560] ___sys_sendmsg+0x51d/0x930 [ 686.421544] ? graph_lock+0x170/0x170 [ 686.425355] ? __switch_to_asm+0x34/0x70 [ 686.429431] ? copy_msghdr_from_user+0x580/0x580 [ 686.434199] ? __schedule+0x884/0x1df0 [ 686.438109] ? find_held_lock+0x36/0x1c0 [ 686.442191] ? lock_downgrade+0x8f0/0x8f0 [ 686.446360] ? rcu_note_context_switch+0x680/0x680 [ 686.451308] ? check_same_owner+0x340/0x340 [ 686.455652] __sys_sendmmsg+0x240/0x6f0 [ 686.459649] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 686.463987] ? __lock_is_held+0xb5/0x140 [ 686.468090] ? fput+0x130/0x1a0 [ 686.471385] ? do_syscall_64+0x9a/0x820 [ 686.475371] ? do_syscall_64+0x9a/0x820 [ 686.479352] ? lockdep_hardirqs_on+0x421/0x5c0 [ 686.483948] ? trace_hardirqs_on+0xbd/0x2c0 [ 686.488286] ? __ia32_sys_read+0xb0/0xb0 [ 686.492366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.497746] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 686.502867] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.508424] __x64_sys_sendmmsg+0x9d/0x100 [ 686.512688] do_syscall_64+0x1b9/0x820 [ 686.516596] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 686.521986] ? syscall_return_slowpath+0x5e0/0x5e0 [ 686.526936] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 686.531975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 686.537005] ? recalc_sigpending_tsk+0x180/0x180 [ 686.541777] ? kasan_check_write+0x14/0x20 [ 686.546035] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 686.550899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.556105] RIP: 0033:0x457099 [ 686.559313] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.578229] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 686.585955] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 07:42:46 executing program 0 (fault-call:6 fault-nth:24): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 686.593234] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 686.600514] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 686.607791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 686.615067] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000017 [ 686.735899] FAULT_INJECTION: forcing a failure. [ 686.735899] name failslab, interval 1, probability 0, space 0, times 0 [ 686.747264] CPU: 1 PID: 21590 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 686.755768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.765138] Call Trace: [ 686.767749] dump_stack+0x1c9/0x2b4 [ 686.771404] ? dump_stack_print_info.cold.2+0x52/0x52 [ 686.776622] ? graph_lock+0x170/0x170 [ 686.780457] should_fail.cold.4+0xa/0x11 07:42:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x1000000000000000}) 07:42:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb2, 0x7000000) 07:42:46 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:46 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x9) 07:42:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000004a0000000030000000030300000000000f000000000000000000000000000000000000000000000000000000030005000000000002000000e000000100000000000000"], 0x80}}, 0x0) 07:42:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2]}}]}, 0x68}}, 0x0) 07:42:46 executing program 6: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e23, @remote}}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000"], 0x80}}, 0x0) [ 686.784547] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 686.789667] ? print_usage_bug+0xc0/0xc0 [ 686.793764] ? graph_lock+0x170/0x170 [ 686.797590] ? find_held_lock+0x36/0x1c0 [ 686.801685] ? __lock_is_held+0xb5/0x140 [ 686.805782] ? check_same_owner+0x340/0x340 [ 686.810136] ? rcu_note_context_switch+0x680/0x680 [ 686.815104] __should_failslab+0x124/0x180 [ 686.819361] should_failslab+0x9/0x14 [ 686.823178] kmem_cache_alloc_node+0x256/0x720 [ 686.827783] __alloc_skb+0x119/0x770 [ 686.831524] ? skb_scrub_packet+0x490/0x490 [ 686.835899] ? find_held_lock+0x36/0x1c0 [ 686.839998] __ip6_append_data.isra.47+0x27a4/0x3600 [ 686.845128] ? lock_downgrade+0x8f0/0x8f0 [ 686.849305] ? kasan_check_read+0x11/0x20 [ 686.853475] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 686.858509] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 686.863695] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 686.868034] ? dst_output+0x180/0x180 [ 686.871852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.877397] ? ip6_setup_cork+0x120b/0x1ac0 [ 686.881748] ? ip6_autoflowlabel.part.48+0x80/0x80 07:42:46 executing program 4: r0 = socket$inet6(0xa, 0x80006, 0x1ff) getsockopt$inet6_tcp_buf(r0, 0x6, 0x37, &(0x7f0000000140)=""/174, &(0x7f0000000000)=0xae) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:46 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xffffff7f00000000) [ 686.886700] ? mark_held_locks+0xc9/0x160 [ 686.890871] ? __local_bh_enable_ip+0x161/0x230 [ 686.895552] ? __local_bh_enable_ip+0x161/0x230 [ 686.900268] ? lockdep_hardirqs_on+0x421/0x5c0 [ 686.904870] ? trace_hardirqs_on+0xbd/0x2c0 [ 686.909204] ? lock_release+0x9f0/0x9f0 [ 686.913189] ? lock_sock_nested+0xe7/0x120 [ 686.917445] ip6_append_data+0x1b4/0x2d0 [ 686.921521] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 686.926553] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 686.931587] rawv6_sendmsg+0x11cb/0x4720 [ 686.935673] ? rawv6_getsockopt+0x140/0x140 [ 686.940001] ? find_held_lock+0x36/0x1c0 [ 686.944076] ? lockdep_hardirqs_on+0x421/0x5c0 [ 686.948673] ? retint_kernel+0x10/0x10 [ 686.952562] ? graph_lock+0x170/0x170 [ 686.956364] ? print_usage_bug+0xc0/0xc0 [ 686.960433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.965974] ? aa_label_sk_perm+0x45b/0x8d0 [ 686.970306] ? aa_profile_af_perm+0x430/0x430 [ 686.974806] ? find_held_lock+0x36/0x1c0 [ 686.978879] ? lock_downgrade+0x8f0/0x8f0 [ 686.983064] ? aa_af_perm+0x5a0/0x5a0 [ 686.986878] inet_sendmsg+0x1a1/0x690 [ 686.990685] ? rawv6_getsockopt+0x140/0x140 [ 686.995003] ? inet_sendmsg+0x1a1/0x690 [ 686.998980] ? ipip_gro_receive+0x100/0x100 [ 687.003310] ? apparmor_socket_sendmsg+0x29/0x30 [ 687.008071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.013636] ? security_socket_sendmsg+0x94/0xc0 [ 687.018398] ? ipip_gro_receive+0x100/0x100 [ 687.022723] sock_sendmsg+0xd5/0x120 [ 687.026443] ___sys_sendmsg+0x51d/0x930 [ 687.030420] ? graph_lock+0x170/0x170 [ 687.034221] ? __switch_to_asm+0x34/0x70 [ 687.038287] ? copy_msghdr_from_user+0x580/0x580 [ 687.043042] ? __schedule+0x884/0x1df0 [ 687.046936] ? find_held_lock+0x36/0x1c0 [ 687.051010] ? lock_downgrade+0x8f0/0x8f0 [ 687.055173] ? rcu_note_context_switch+0x680/0x680 [ 687.060112] ? check_same_owner+0x340/0x340 [ 687.064442] __sys_sendmmsg+0x240/0x6f0 [ 687.068428] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 687.072754] ? __lock_is_held+0xb5/0x140 [ 687.076832] ? fput+0x130/0x1a0 [ 687.080118] ? do_syscall_64+0x9a/0x820 [ 687.084103] ? do_syscall_64+0x9a/0x820 [ 687.088090] ? lockdep_hardirqs_on+0x421/0x5c0 [ 687.092678] ? trace_hardirqs_on+0xbd/0x2c0 [ 687.097005] ? __ia32_sys_read+0xb0/0xb0 [ 687.101069] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.106441] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 687.111550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.117099] __x64_sys_sendmmsg+0x9d/0x100 [ 687.121341] do_syscall_64+0x1b9/0x820 [ 687.125235] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 687.130608] ? syscall_return_slowpath+0x5e0/0x5e0 [ 687.135541] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 687.140559] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 687.145576] ? recalc_sigpending_tsk+0x180/0x180 [ 687.150337] ? kasan_check_write+0x14/0x20 [ 687.154582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 687.159441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.164637] RIP: 0033:0x457099 [ 687.167834] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.186737] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 687.194452] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 687.201737] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 687.209002] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 687.216269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 687.223553] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000018 07:42:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x68}}, 0x0) 07:42:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb0, 0x7000000) 07:42:46 executing program 0 (fault-call:6 fault-nth:25): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xcff899, 0xa0000) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000140)=""/2) 07:42:46 executing program 6: r0 = socket$l2tp(0x18, 0x1, 0x1) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xc000000000000000, 0x8, 0x9315, 0x8, 0x6, 0x0, 0x0, 0x3, 0x215, 0x38, 0x188, 0x36d4f7678000000, 0x1d470d93, 0x20, 0x1, 0x10001, 0x80000001, 0x400}, [{0x6474e551, 0x1, 0x7ff, 0x4, 0x2, 0x20, 0xffffffff, 0x456}, {0x60000000, 0x5, 0x2, 0x7, 0x1f, 0x1234}], "59770d913ca9ba03e75758f70c843e3788c777bc8c85020a849f455611ac10901c2500fc1019bfb10d81d9983fb79634eeb8855e9f9f1b", [[], [], [], [], [], [], [], [], []]}, 0x9af) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x9, 0x1ff, 0x5, 0xffff, 0x7f}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200000, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000c00)) clock_gettime(0x0, &(0x7f0000000c40)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000c80)={{r3, r4/1000+10000}, {0x0, 0x2710}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000d00)={0x0, 0x8000}, &(0x7f0000000d40)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x4, 0x50, 0x4, 0x64, 0xdb}, &(0x7f0000000dc0)=0x14) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f0000000cc0)=0x14, 0x4) getsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f00000000c0)=0x5, &(0x7f0000000140)=0x4) r7 = socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x3, 0x300) sendmsg$key(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000017e000000100000000000000000800120002000200000000000000000030000000030300000000000f00000000000000000000000001ac1414bb0000000000000000000000000300050000000000020000007f43611f0a8f00f8d9d72264"], 0x80}}, 0x0) getsockopt$inet_int(r2, 0x0, 0x18, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) 07:42:46 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000140)=""/16, &(0x7f0000000180)=0x10) [ 687.387533] XFS (loop3): Invalid superblock magic number 07:42:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xe047030000000000}) 07:42:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x68}}, 0x0) 07:42:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x9c, 0x7000000) 07:42:46 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000000)) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0xddc, 0x10001, 0x3, 0x0, 0x8}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cgroup.clone_children\x00', 0x2, 0x0) r5 = epoll_create1(0x0) eventfd(0x268e) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000040)) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:46 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x87b6, 0x400100) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000140)={0xffffffffffffffff, 0x40, 0x6}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) openat$cgroup_type(r3, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x3ff, 0x7ff}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x6, 0x101, 0x202, 0x1, 0x0, 0x4, 0x76, 0x7fffffff, r4}, 0x20) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="7348f804d8fa94cadff9577fbe3373fa9e4519eb00000000000000000000000000000000") r1 = socket$key(0xf, 0x3, 0x2) sendto$llc(r1, &(0x7f0000000240)="230d2ed47b7a26bd084e38550e05f9140ab68fd1b5e7a0fc82a13ff69e90d1680276bc588c30151cb5a077f3ccbb843017abf52d8dc5b828c8794533876ea02d6f3825b6a35660af117b3b3b74554a8ecadb9389c4cf027876cb736ba7d0317520a2f1140dcb68985d6199124e92d466d7ef382239aa73c3033a07676cc5c510a6e616028e76c587b295d67c0c84bf32a1b332161b16a470454c1d1bb7dd8a69f7003cd29398a631be3d02f566df4c8c8dc71de99f396df1f22d6fddaa4dcbb1496d524b46da3096bb3d2d9c0271384ee737f519fbc1f137daa9ded0f1", 0xdd, 0x8000, &(0x7f0000000040)={0x1a, 0x17, 0x40, 0x7, 0x2, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0xffffffffffffff9d, 0x0, 0x0, 0x70bd2c, 0x3506}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x78}}, 0x0) [ 687.678427] FAULT_INJECTION: forcing a failure. [ 687.678427] name failslab, interval 1, probability 0, space 0, times 0 [ 687.689778] CPU: 1 PID: 21656 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 687.698286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.707647] Call Trace: [ 687.710257] dump_stack+0x1c9/0x2b4 [ 687.713906] ? dump_stack_print_info.cold.2+0x52/0x52 [ 687.719567] should_fail.cold.4+0xa/0x11 [ 687.719587] ? __kernel_text_address+0xd/0x40 [ 687.719621] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 687.719642] ? __save_stack_trace+0x8d/0xf0 [ 687.719672] ? graph_lock+0x170/0x170 [ 687.719692] ? save_stack+0x43/0xd0 [ 687.719709] ? kasan_kmalloc+0xc4/0xe0 [ 687.719730] ? find_held_lock+0x36/0x1c0 [ 687.719754] ? __lock_is_held+0xb5/0x140 [ 687.719787] ? check_same_owner+0x340/0x340 [ 687.719803] ? mark_held_locks+0xc9/0x160 [ 687.719827] ? rcu_note_context_switch+0x680/0x680 [ 687.719844] ? kmem_cache_alloc_node+0x217/0x720 [ 687.719868] __should_failslab+0x124/0x180 [ 687.719888] should_failslab+0x9/0x14 [ 687.719907] kmem_cache_alloc_node_trace+0x259/0x720 [ 687.719936] __kmalloc_node_track_caller+0x33/0x70 [ 687.719956] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 687.719976] __alloc_skb+0x155/0x770 [ 687.719997] ? skb_scrub_packet+0x490/0x490 [ 687.720020] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.720046] ? retint_kernel+0x10/0x10 [ 687.720074] ? __ip6_append_data.isra.47+0x97e/0x3600 [ 687.720108] __ip6_append_data.isra.47+0x27a4/0x3600 [ 687.720126] ? lock_downgrade+0x8f0/0x8f0 [ 687.720148] ? kasan_check_read+0x11/0x20 [ 687.720170] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 687.720188] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 687.720214] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 687.720249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.720265] ? ip6_setup_cork+0x120b/0x1ac0 [ 687.720289] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 687.720306] ? mark_held_locks+0xc9/0x160 [ 687.720328] ? __local_bh_enable_ip+0x161/0x230 [ 687.720344] ? __local_bh_enable_ip+0x161/0x230 [ 687.720360] ? lockdep_hardirqs_on+0x421/0x5c0 [ 687.720378] ? trace_hardirqs_on+0xbd/0x2c0 [ 687.720393] ? lock_release+0x9f0/0x9f0 [ 687.720411] ? lock_sock_nested+0xe7/0x120 [ 687.720432] ip6_append_data+0x1b4/0x2d0 [ 687.720451] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 687.720473] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 687.720494] rawv6_sendmsg+0x11cb/0x4720 [ 687.720531] ? rawv6_getsockopt+0x140/0x140 [ 687.720548] ? mark_held_locks+0xc9/0x160 [ 687.720571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.720589] ? lockdep_hardirqs_on+0x421/0x5c0 [ 687.720616] ? retint_kernel+0x10/0x10 [ 687.720633] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 687.720653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.720671] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 687.720691] ? graph_lock+0x170/0x170 [ 687.720714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.720734] ? aa_label_sk_perm+0x45b/0x8d0 [ 687.720759] ? aa_profile_af_perm+0x430/0x430 [ 687.720778] ? find_held_lock+0x36/0x1c0 [ 687.720805] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.720824] ? lockdep_hardirqs_on+0x421/0x5c0 [ 687.720842] ? retint_kernel+0x10/0x10 [ 687.720859] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 687.720879] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.720898] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 687.720941] inet_sendmsg+0x1a1/0x690 [ 687.720961] ? rawv6_getsockopt+0x140/0x140 [ 687.720978] ? inet_sendmsg+0x1a1/0x690 [ 687.720999] ? ipip_gro_receive+0x100/0x100 [ 687.721023] ? security_socket_sendmsg+0x76/0xc0 [ 687.725687] XFS (loop3): Invalid superblock magic number 07:42:47 executing program 4: r0 = socket$inet6(0xa, 0x80006, 0x1ff) getsockopt$inet6_tcp_buf(r0, 0x6, 0x37, &(0x7f0000000140)=""/174, &(0x7f0000000000)=0xae) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 07:42:47 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xb6050000) 07:42:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x115, 0x7000000) 07:42:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd80c000000000000}) [ 687.730001] ? security_socket_sendmsg+0x82/0xc0 [ 687.730019] ? security_socket_sendmsg+0x94/0xc0 [ 687.730036] ? ipip_gro_receive+0x100/0x100 [ 687.730053] sock_sendmsg+0xd5/0x120 [ 687.730073] ___sys_sendmsg+0x51d/0x930 [ 688.048129] ? graph_lock+0x170/0x170 [ 688.048152] ? copy_msghdr_from_user+0x580/0x580 07:42:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x5c, 0x7000000) 07:42:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x4000000]}}]}, 0x68}}, 0x0) [ 688.048173] ? find_held_lock+0x36/0x1c0 07:42:47 executing program 0 (fault-call:6 fault-nth:26): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) 07:42:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x9, 0x2}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600c261e54101b9548baeb69a0000000002000000e000000100001000000000060800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030000e00000010000000000000000"], 0x80}}, 0x0) 07:42:47 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x4000000) [ 688.048197] ? lock_downgrade+0x8f0/0x8f0 07:42:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x900000000000000}) [ 688.048221] ? retint_kernel+0x10/0x10 [ 688.048241] ? rcu_note_context_switch+0x680/0x680 [ 688.048257] ? check_same_owner+0x340/0x340 07:42:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x17d, 0x7000000) [ 688.048281] __sys_sendmmsg+0x240/0x6f0 [ 688.048304] ? __ia32_sys_sendmsg+0xb0/0xb0 07:42:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:47 executing program 4 (fault-call:5 fault-nth:0): openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x2b) [ 688.048323] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.048341] ? retint_kernel+0x10/0x10 07:42:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xdf, 0x7000000) 07:42:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={r3, 0x4f, "a607c89af2cf32bbfcfc4925501bf2bb44e2041ca1fef823fbffc1b0b155ff589c28d60d058bc25cd2027185bfec4646b561b5a162f69c00ad21a81dcde9be98bece84dc32b70368e6d74583665df5"}, &(0x7f0000000240)=0x57) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000e80300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 688.048357] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 688.048373] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.048402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.048423] ? retint_kernel+0x10/0x10 [ 688.048448] __x64_sys_sendmmsg+0x9d/0x100 [ 688.048466] do_syscall_64+0x1b9/0x820 [ 688.048481] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 688.048499] ? syscall_return_slowpath+0x5e0/0x5e0 [ 688.048515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 688.048530] ? trace_hardirqs_on_caller+0x2b0/0x2b0 07:42:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x400300]}}]}, 0x68}}, 0x0) [ 688.048547] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 688.048565] ? prepare_exit_to_usermode+0x291/0x3b0 [ 688.048586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 688.048620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.048632] RIP: 0033:0x457099 [ 688.048648] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.048656] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 688.048673] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 688.048684] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 688.048693] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 688.048702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 688.048711] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 0000000000000019 [ 688.277200] XFS (loop4): Invalid superblock magic number [ 688.417456] XFS (loop3): Invalid superblock magic number 07:42:47 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xffffff7f) [ 688.435533] FAULT_INJECTION: forcing a failure. [ 688.435533] name failslab, interval 1, probability 0, space 0, times 0 [ 688.590195] CPU: 0 PID: 21739 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 688.598693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.608047] Call Trace: [ 688.610659] dump_stack+0x1c9/0x2b4 [ 688.614307] ? dump_stack_print_info.cold.2+0x52/0x52 [ 688.619523] should_fail.cold.4+0xa/0x11 [ 688.623605] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 688.628733] ? trace_hardirqs_on_thunk+0x1a/0x1c 07:42:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x500000000000000}) [ 688.633499] ? lockdep_hardirqs_on+0x421/0x5c0 [ 688.638113] ? retint_kernel+0x10/0x10 [ 688.642019] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 688.646983] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.651484] FAULT_INJECTION: forcing a failure. [ 688.651484] name failslab, interval 1, probability 0, space 0, times 0 [ 688.651755] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 688.651769] ? graph_lock+0x170/0x170 [ 688.651798] ? save_stack+0x43/0xd0 [ 688.675854] ? kasan_kmalloc+0xc4/0xe0 [ 688.679771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.684561] ? retint_kernel+0x10/0x10 [ 688.688473] ? rcu_all_qs+0x2d/0x2d0 [ 688.692210] ? rcu_note_context_switch+0x680/0x680 [ 688.697157] ? kmem_cache_alloc_node+0x217/0x720 [ 688.701963] __should_failslab+0x124/0x180 [ 688.706222] should_failslab+0x9/0x14 [ 688.710048] kmem_cache_alloc_node_trace+0x259/0x720 [ 688.715193] __kmalloc_node_track_caller+0x33/0x70 [ 688.720157] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 688.724935] __alloc_skb+0x155/0x770 [ 688.729128] ? skb_scrub_packet+0x490/0x490 [ 688.733467] ? mark_held_locks+0xc9/0x160 [ 688.737634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.742410] ? lockdep_hardirqs_on+0x421/0x5c0 [ 688.747011] ? find_held_lock+0x36/0x1c0 [ 688.751113] __ip6_append_data.isra.47+0x27a4/0x3600 [ 688.756229] ? lock_downgrade+0x8f0/0x8f0 [ 688.760400] ? kasan_check_read+0x11/0x20 [ 688.764557] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 688.769589] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 688.774282] ? ip6_setup_cork+0x1ac0/0x1ac0 [ 688.778616] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.783399] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 688.788864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.794413] ? ip6_setup_cork+0x120b/0x1ac0 [ 688.798755] ? ip6_autoflowlabel.part.48+0x80/0x80 [ 688.803699] ? mark_held_locks+0xc9/0x160 [ 688.807860] ? __local_bh_enable_ip+0x161/0x230 [ 688.812537] ? __local_bh_enable_ip+0x161/0x230 [ 688.817213] ? lockdep_hardirqs_on+0x421/0x5c0 [ 688.821802] ? trace_hardirqs_on+0xbd/0x2c0 [ 688.826133] ? lock_release+0x9f0/0x9f0 [ 688.830126] ? lock_sock_nested+0xe7/0x120 [ 688.834369] ip6_append_data+0x1b4/0x2d0 [ 688.838434] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 688.843462] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 688.848487] rawv6_sendmsg+0x11cb/0x4720 [ 688.852569] ? rawv6_getsockopt+0x140/0x140 [ 688.856897] ? mark_held_locks+0xc9/0x160 [ 688.861275] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.866034] ? lockdep_hardirqs_on+0x421/0x5c0 [ 688.870621] ? retint_kernel+0x10/0x10 [ 688.874512] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 688.879452] ? retint_kernel+0x10/0x10 [ 688.883347] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.888121] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 688.893586] ? graph_lock+0x170/0x170 [ 688.897403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.902950] ? aa_label_sk_perm+0x45b/0x8d0 [ 688.907283] ? aa_profile_af_perm+0x430/0x430 [ 688.911782] ? find_held_lock+0x36/0x1c0 [ 688.915856] ? lock_downgrade+0x8f0/0x8f0 [ 688.920008] ? retint_kernel+0x10/0x10 [ 688.923923] ? aa_af_perm+0x5a0/0x5a0 [ 688.927740] inet_sendmsg+0x1a1/0x690 [ 688.931545] ? rawv6_getsockopt+0x140/0x140 [ 688.935868] ? inet_sendmsg+0x1a1/0x690 [ 688.939851] ? ipip_gro_receive+0x100/0x100 [ 688.944178] ? apparmor_socket_sendmsg+0x29/0x30 [ 688.948939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.954483] ? security_socket_sendmsg+0x94/0xc0 [ 688.959241] ? ipip_gro_receive+0x100/0x100 [ 688.963568] sock_sendmsg+0xd5/0x120 [ 688.967291] ___sys_sendmsg+0x51d/0x930 [ 688.971266] ? graph_lock+0x170/0x170 [ 688.975075] ? __switch_to_asm+0x34/0x70 [ 688.979195] ? copy_msghdr_from_user+0x580/0x580 [ 688.983971] ? lockdep_hardirqs_on+0x421/0x5c0 [ 688.988555] ? retint_kernel+0x10/0x10 [ 688.992448] ? find_held_lock+0x36/0x1c0 [ 688.996525] ? lock_downgrade+0x8f0/0x8f0 [ 689.000692] ? rcu_note_context_switch+0x680/0x680 [ 689.005623] ? check_same_owner+0x340/0x340 [ 689.009958] __sys_sendmmsg+0x240/0x6f0 [ 689.013944] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 689.018270] ? __lock_is_held+0xb5/0x140 [ 689.022356] ? fput+0x130/0x1a0 [ 689.025642] ? do_syscall_64+0x9a/0x820 [ 689.029630] ? do_syscall_64+0x9a/0x820 [ 689.033608] ? lockdep_hardirqs_on+0x421/0x5c0 [ 689.038193] ? trace_hardirqs_on+0xbd/0x2c0 [ 689.042517] ? __ia32_sys_read+0xb0/0xb0 [ 689.046585] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.051952] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 689.057072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.062645] __x64_sys_sendmmsg+0x9d/0x100 [ 689.066889] do_syscall_64+0x1b9/0x820 [ 689.070790] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 689.076179] ? syscall_return_slowpath+0x5e0/0x5e0 [ 689.081123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 689.085972] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 689.090995] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 689.096016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.101565] ? prepare_exit_to_usermode+0x291/0x3b0 [ 689.106597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 689.111455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.116648] RIP: 0033:0x457099 [ 689.119844] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.138745] RSP: 002b:00007f6632c14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 689.146457] RAX: ffffffffffffffda RBX: 00007f6632c156d4 RCX: 0000000000457099 [ 689.153728] RDX: 040000000000004d RSI: 00000000200092c0 RDI: 0000000000000004 [ 689.161001] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 689.168269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 689.175539] R13: 00000000004d4440 R14: 00000000004c8b19 R15: 000000000000001a 07:42:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000004d, 0x0) [ 689.182838] CPU: 1 PID: 21773 Comm: syz-executor4 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 689.191348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.200714] Call Trace: [ 689.203318] dump_stack+0x1c9/0x2b4 [ 689.206962] ? dump_stack_print_info.cold.2+0x52/0x52 [ 689.212165] ? mark_held_locks+0x160/0x160 [ 689.216424] should_fail.cold.4+0xa/0x11 [ 689.220499] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 689.225612] ? graph_lock+0x170/0x170 [ 689.229421] ? graph_lock+0x170/0x170 [ 689.233241] ? find_held_lock+0x36/0x1c0 [ 689.237324] ? check_same_owner+0x340/0x340 [ 689.241649] ? rcu_note_context_switch+0x680/0x680 [ 689.246579] __should_failslab+0x124/0x180 [ 689.250813] should_failslab+0x9/0x14 [ 689.254600] __kmalloc+0x2b2/0x720 [ 689.258132] ? rcu_is_watching+0x8c/0x150 [ 689.262279] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 689.266948] ? rw_copy_check_uvector+0x361/0x3e0 [ 689.271710] rw_copy_check_uvector+0x361/0x3e0 [ 689.276307] import_iovec+0xcf/0x470 [ 689.280033] ? dup_iter+0x270/0x270 [ 689.283660] ? proc_cwd_link+0x1d0/0x1d0 [ 689.287717] vfs_readv+0xf5/0x1c0 [ 689.291160] ? compat_rw_copy_check_uvector+0x440/0x440 [ 689.296514] ? __fget_light+0x2f7/0x440 [ 689.300489] ? fget_raw+0x20/0x20 [ 689.303949] ? __sb_end_write+0xac/0xe0 [ 689.307922] do_preadv+0x1cc/0x280 [ 689.311466] ? do_readv+0x310/0x310 [ 689.315095] ? __ia32_sys_read+0xb0/0xb0 [ 689.319161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.324537] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 689.329643] __x64_sys_preadv+0x9a/0xf0 [ 689.333616] do_syscall_64+0x1b9/0x820 [ 689.337496] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 689.342852] ? syscall_return_slowpath+0x5e0/0x5e0 [ 689.347773] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 689.352792] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 689.357809] ? recalc_sigpending_tsk+0x180/0x180 [ 689.362560] ? kasan_check_write+0x14/0x20 [ 689.366795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 689.371640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.376829] RIP: 0033:0x457099 [ 689.380010] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.398917] RSP: 002b:00007f91c54d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 689.406619] RAX: ffffffffffffffda RBX: 00007f91c54da6d4 RCX: 0000000000457099 [ 689.413882] RDX: 00000000000001d0 RSI: 00000000200017c0 RDI: 0000000000000005 [ 689.421152] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 689.428419] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000006 07:42:48 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x2b) [ 689.435687] R13: 00000000004d3bd0 R14: 00000000004c86c8 R15: 0000000000000000 07:42:48 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x7e, 0x7000000) 07:42:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x4]}}]}, 0x68}}, 0x0) 07:42:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x44100, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0xfffffffffffffffb}}, 0x18) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000008000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x80) 07:42:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10000, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000040)={0x760, 0x1}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f00000000c0)=0xf1a) 07:42:49 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x88000000) [ 689.642836] XFS (loop3): Invalid superblock magic number 07:42:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x31, 0x7000000) 07:42:49 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x193, 0x2b) 07:42:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x34000]}}]}, 0x68}}, 0x0) 07:42:49 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000001640)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000002000000000000000000000000001ac1414bb000000000000000000000000030005000000aa1a18710000e0000001000000000000000049811bdb098d24f6184e66890779538053d8a85db055885c9a92686b1642e67417df15f547bf2d2d7a61b2f5c44f5fe05e2cc194a6b5601ef62eb914ef590dfcb1ae1f45609869dbb7970f0b034b573fb0ebb763c45a355380cdd155659bed202a4fdd1a4f06293892e652d306f3e68b29d350a3b9e3f9cf0651c1ca5b35b5b710842a4dbe858c30000000000000005980935212b566b75a08511626d6758c2b35e2e1ffd6eee05d2d94f529491ab453a0e2d4a6af21ec02e6ffb448b5e8899cc592d27d358d219c8f8dd6bf76b13772c3c523e32b544c58f9479b1e9b4efd6318aae711b5486fdb91ef707f0d12f9fb453580aeb363bc963ec238ae26a01f256addf93d65f59888bdd600fb8fc95349d1b4bf51128110b53f230a54403cefd735ef"], 0x80}}, 0x0) socketpair$inet(0x2, 0x4, 0x9, &(0x7f0000000200)) r2 = syz_open_dev$mouse(&(0x7f0000001480)='/dev/input/mouse#\x00', 0x2, 0x400000) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) preadv(r0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/103, 0x67}, {&(0x7f0000001240)=""/238, 0xee}, {&(0x7f0000001340)=""/103, 0x67}, {&(0x7f00000013c0)=""/77, 0x4d}], 0x4, 0x0) syz_open_dev$vcsa(&(0x7f0000001600)='/dev/vcsa#\x00', 0x2, 0x18802) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x600002, 0x0) r4 = getpgid(0x0) ptrace$setregset(0x4205, r4, 0x206, &(0x7f00000000c0)={&(0x7f0000000240)="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", 0x1000}) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f0000000040)=0x40000) modify_ldt$write2(0x11, &(0x7f00000001c0)={0x94cf, 0xffffffffffffffff, 0x0, 0x2063, 0x2, 0x4, 0x1ff, 0x3, 0x8, 0x1}, 0x10) 07:42:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x347e0}) 07:42:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000008, 0x0) 07:42:49 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x4c00) [ 689.967326] XFS (loop3): unknown mount option [à]. 07:42:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x20000000]}}]}, 0x68}}, 0x0) 07:42:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000012, 0x0) 07:42:49 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x58, 0x2b) [ 690.001865] XFS (loop3): unknown mount option [à]. 07:42:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xfa, 0x7000000) 07:42:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x2000000000000}) 07:42:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000028, 0x0) 07:42:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_lifetime={0x4, 0x2, 0xfff, 0x8, 0x8000, 0x100000001}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x4000000000000000) [ 690.292957] XFS (loop3): Invalid superblock magic number 07:42:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x54, 0x7000000) 07:42:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x68}}, 0x0) 07:42:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1ba, 0x2b) 07:42:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000002c0)={r0, 0x8, 0x4, "986ab8cf000cfbaf1ea949f4e8b1c0a6a947f4fe91a996660000000054cf1b7df3544bb69519ea986a00000001b0710031c6704e7e652e230715f36977042817e61e3eb76d01d805dc6c2a3bea5da61f30194b0b11"}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$key(0xf, 0x3, 0x2) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[{0x7f, 0x80, 0x4, 0xfffe0}, {0x8001, 0x80000001, 0x5, 0x7f}, {0x1, 0x3ff, 0x5, 0x4}]}, 0x10) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1406bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) pselect6(0x40, &(0x7f0000000140)={0x0, 0xab27, 0x10000, 0x7, 0x8, 0x1, 0x3, 0x400020000000}, &(0x7f0000000180)={0x0, 0x20, 0x200, 0x1, 0x1, 0x4, 0xb681, 0x3}, &(0x7f0000000240)={0xffffffffffff2f9e, 0x3, 0x4, 0x5, 0x6, 0x9, 0x1, 0xe000000}, &(0x7f0000000280)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340)={0x7}, 0x8}) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000440)) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x6, 0x200080) 07:42:52 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x4c) 07:42:52 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000000d, 0x0) 07:42:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xa00000000000000}) 07:42:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7ff, &(0x7f0000000240)="0a000000005d85c1c5c05ef482f485c3c446b5c29bcd01f40763549c0ff51869325f6bdd822dfe792177a1a76931999e79db0b281f8da0ec25855ea5575fc4df3a94d13a4d782b723f227638c4b13a02b2235a8aaba6bdde97208fe90d79fbe5") r1 = syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x5, 0x109100) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000340)) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) r2 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x7, 0x4, 0x40, 0x3, 0x2}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x8202, 0x7, 0x200, r3}, 0x10) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x4000, 0x0) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f00000001c0)) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x9d}}, 0xfffffffffffffffc) 07:42:52 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x1000000) 07:42:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0xc0, 0x2b) 07:42:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x14f, 0x7000000) 07:42:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f00000000c0)=0x1) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000140)) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x100, 0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x5) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e000000100000000000000008ece7644fb52c7f7bdf3f0b855efe852c5df9cb985c4480ae5753ddefb6f38e529ef07a7c0405fbd48d330342623f6a270def6a0349be8ef90ccc84688427357aace26075b9eb3d8cbd8f14625b1dacecae3bf800f8b68cdc1af5166791990abcbc7cb4bf4f5258b41fa1bc66b2de0eb70f8512274bea6ea0fb688ce5ddb5341c5a19de7a2a27b35"], 0x80}}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x4800, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_udp_int(r3, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 07:42:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x68}}, 0x0) [ 692.818630] XFS (loop3): Invalid superblock magic number 07:42:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x92, 0x2b) 07:42:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xfdffffff00000000}) 07:42:52 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000021, 0x0) 07:42:52 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xeffdffff) 07:42:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400002, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000240)=""/98, 0x100000, 0x1000, 0x9}, 0x18) ioctl$KDENABIO(r1, 0x4b36) r2 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r3, 0x7ff}, 0x8) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0x17, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x184, 0x7000000) 07:42:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x34000]}}]}, 0x68}}, 0x0) 07:42:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000140)={0x100000001, 0x9, 0x8000}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000082000000e00000010000000000000000"], 0x80}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c, 0x800) [ 693.176093] XFS (loop3): Invalid superblock magic number 07:42:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0xae, 0x2b) 07:42:52 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x8800000000000000) 07:42:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 07:42:52 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000017, 0x0) 07:42:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x68}}, 0x0) 07:42:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x88, 0x7000000) 07:42:52 executing program 6: r0 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f00000000c0)=0x60, 0x0) read(r0, &(0x7f0000000240)=""/231, 0xe7) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0xff, &(0x7f0000000180)="0a5cc80700315f85715070") fadvise64(r0, 0x0, 0x5, 0x5) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000001010000000000000000000001ac1414bb00000000000000000000000003000500000015b902000000e00000010000000000000000"], 0x80}}, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000080)={0xffffffff80000001, 0x8001, 0x3, 0x4}) 07:42:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd}) 07:42:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x189, 0x2b) 07:42:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000000)=0x6, 0x4) getsockopt$inet6_int(r0, 0x29, 0x5c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 693.498414] XFS (loop3): unknown mount option [ ]. 07:42:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x202000) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000040)={0x9, 0x0, 0x7, 0xfff}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0x101, 0x4) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 693.547091] XFS (loop3): unknown mount option [ ]. 07:42:52 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000019, 0x0) 07:42:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x4, 0x7000000) 07:42:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1cf, 0x2b) 07:42:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x20000000]}}]}, 0x68}}, 0x0) 07:42:52 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xffff000000000000) 07:42:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd80c0000}) 07:42:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x400300]}}]}, 0x68}}, 0x0) 07:42:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000030000000030300000000000f0000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000000000000000"], 0x80}}, 0x0) 07:42:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x59, 0x7000000) 07:42:53 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="0210a963760d00001000000000000002000000e0000006000000000000000008001200020002000000000000000000300000000303000000000000000000000001ac140cbb000000000000000000000000030005000000000002000000e0000001000000000000e7ffffffffffffff0000000000000000dc730b5a4717210ac8b79a0392fe589cd9e5e19fa21d1cfff0aa0c5cb52ef0685616054972d5ac55546a5aa0bf421bf9d3f8d1179360e4f71d890e7411963cc9c3fe20af6a194f67"], 0x80}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}], 0x2, &(0x7f0000000140)=""/202, 0xca, 0x8}, 0x40000000) 07:42:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000001b, 0x0) 07:42:53 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x152, 0x2b) [ 693.843841] XFS (loop3): Invalid superblock magic number 07:42:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$key(0xf, 0x3, 0x2) 07:42:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x4000000}) 07:42:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x68}}, 0x0) 07:42:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xd9, 0x7000000) 07:42:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x505040, 0x0) accept$nfc_llcp(r1, &(0x7f0000000140), &(0x7f0000000040)=0x60) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012fd01000200000000000000000030000000030300000000000f000000000400000000001e000000000000000001ac1414bb000000000000000000000000030005000000000002000000e000000100000000000000001a33179cd05f779d943ca3c3c02d597102a94f5a203ee10bd6265fada5f22408709b6127a9446d9b25b2101cd24d9704ad30d705e8edfb64c49b016960bec8389208a77d7bfb21251176ff6536b621312a73d8ed619cf99cbf33c3a99a4e37ed15325ffbdd1237d6ed"], 0x80}}, 0x0) 07:42:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000000c, 0x0) 07:42:53 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0xfd, 0x2b) 07:42:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x7) clock_settime(0x3, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000300)={0x11, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}, 0x1}}, 0x1, 0x1, [{{0xa, 0x4e20, 0x7c19, @loopback, 0x3ff}}]}, 0x110) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="020d00001500000000000000000000000800120000000200c06b6e000300000006006c00ff200000ff7f00000000000000000000000000000000000000000001fe8000000000000000000000000000bb0800120002000200000000000000000006000000030300000000000f0000000000000000090000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0xa8}}, 0x0) [ 694.197699] XFS (loop3): Invalid superblock magic number 07:42:53 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xffffffff00000000) 07:42:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x2000]}}]}, 0x68}}, 0x0) 07:42:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000000b, 0x0) 07:42:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x19c, 0x7000000) 07:42:53 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x54, 0x2b) 07:42:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x3) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x3000000}) 07:42:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$key(0xf, 0x3, 0x2) 07:42:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000000f, 0x0) 07:42:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x68}}, 0x0) 07:42:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1b1, 0x7000000) 07:42:53 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x7d, 0x2b) 07:42:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = mq_open(&(0x7f0000000000)='lo^\x00', 0x0, 0x2, &(0x7f0000000040)={0x9, 0x0, 0x16, 0x9, 0x100000000, 0x4cc971d, 0xbb64, 0xfffffffffffffff7}) mq_timedsend(r1, &(0x7f0000000140)="22120d50a7950de250f19ce2be03b4bc39559e485e95b2bedcfdfb136cef6b79320205f40631fa162862a33bcc83db146477219f86bbed97b6597396ffac32c155f2f64f2e7add916e677632de469358984357ba53", 0x55, 0xfff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 694.601377] XFS (loop3): Invalid superblock magic number 07:42:54 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x200000000000000) 07:42:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x100000000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x6000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000440)={0x0, 0xa17}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000004c0)={r2, @in6={{0xa, 0x4e21, 0x4, @mcast2, 0x5ead}}, 0x1b4c957d, 0x1}, &(0x7f0000000580)=0x90) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000005c0)=@assoc_id=r2, &(0x7f0000000600)=0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e21, 0x0, @mcast1, 0x10001}}}, 0x90) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300000000000f0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000000000000000000000"], 0x80}}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 07:42:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xe}) [ 694.847807] XFS (loop3): unknown mount option []. 07:42:54 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x133, 0x2b) 07:42:54 executing program 6: r0 = socket$inet6(0xa, 0x800, 0x7fffffffffffd) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0)=0x401, 0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x20000000000000a9}, 0x80}}, 0x1000000) 07:42:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x42, 0x7000000) [ 694.881699] XFS (loop3): unknown mount option []. 07:42:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x68}}, 0x0) 07:42:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7f, 0x80000) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xc4}) 07:42:54 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0xe000000) 07:42:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:54 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000006, 0x0) [ 695.099650] XFS (loop3): unknown mount option [Ä]. 07:42:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x68}}, 0x0) 07:42:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x7c, 0x7000000) 07:42:54 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x122, 0x2b) [ 695.177008] XFS (loop3): unknown mount option [Ä]. 07:42:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) shmget(0x0, 0x1000, 0x54001820, &(0x7f0000ffc000/0x1000)=nil) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x177a571ec15c68a7, 0x0, 0x100000, 0x25dfdbfc}, 0x50}}, 0x0) 07:42:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x48000000}) 07:42:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}]}, 0x68}}, 0x0) 07:42:54 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000003, 0x0) 07:42:54 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0xf, 0x2b) 07:42:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xb9, 0x7000000) 07:42:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc8315e0000857150706e382e3e4b5cd22827babe25f0f588eba1001609c964904ff7db230d5b99216d49c07f86d38db7e5d31d") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x78}}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000180)={r3, 0x80000001}, 0x8) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1b, 0x19, "3ddc37569c92a0e54956bb5f3fd5e766d627911296a52813371883c1030caaa41c5c409cb28d118563024a8f227ae4ef9b093eb07280e9ec0d0a2aa2a98ff1be", "b6105f0c57886c0de7ca4a13e1648d5303cdb67f66380ec24274704b2e454439", [0x3, 0x8]}) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000040)) 07:42:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r2, 0x6e90, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e23, @local}}}, 0x118) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012b3697f64d8eb5002000000000030000000030300000000000f0000000081000000000000000000000000000001ac1414bb000000004000000000000000030005000000000002000000e00000010000000000000000343ae107b39e1b4c13c7133907671a22b8e76a1b6250c1e45d977e42bcd4da9aab95eadccb7dd628d2b4262504361a48b711e7db939f3edc7c70c7cf76cdd1add4693ed957902ae83d0a7fb7f0c435ff4e0dbe90c297ecbd21f33b9d96d2f17546c0e104f70402857472a144172bb38a2e231dc5801c"], 0x80}}, 0x0) [ 695.521553] XFS (loop3): Invalid superblock magic number 07:42:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x7000000) 07:42:55 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x7000000) 07:42:55 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x90, 0x2b) 07:42:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x2]}}]}, 0x68}}, 0x0) 07:42:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x2, 0xf, 0x25, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_sa={0x2, 0x1, 0x4d2, 0x100000001, 0x400, 0x72, 0x3, 0xe0000000}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e24, 0x6, @loopback, 0x3fd}}, @sadb_lifetime={0x4, 0x4, 0x1ab, 0x1, 0xffffffff}, @sadb_address={0x3, 0x5, 0x33, 0xa0, 0x0, @in={0x2, 0x4e24, @remote}}, @sadb_x_sec_ctx={0x10, 0x18, 0x7778a5df, 0x80000001, 0x71, "bc86623fc98eadba7da49b3bfab89bce116873ac5bc76efb5041bb60545af725c01db1c7f113f670042c383d5c6a0f721d2cb4efb34ff1a066d9bd63b0809d79b41ff895174440c3f04827b0f9d1ca236839cf06972f384b2ff03d1e82d803f740ab81ee08d2feedf107cfdec13ef5e0a5"}, @sadb_address={0x3, 0x6, 0x33, 0x20, 0x0, @in={0x2, 0x4e20, @loopback}}]}, 0x128}}, 0x800) ioctl(r0, 0x8912, &(0x7f0000000380)="2a5cc8070031b64752cd7d01da1351cb6ab3ab16c810b04f08ba23db73ff1cef5ab1d931b6d06f8ec886c16069851fb9ae4618ec450b39aad7011f67bf1e76668ee9f1cb5fcff707f6cc2c5e7ac8482a45b0d74d4583359f6000f020ee340630ad05e5b069c1bacb5a469a9232343570983a87fec840d7675cad874a407e") write$binfmt_script(r1, &(0x7f0000000400)={'#! ', './file0', [{0x20, '/dev/null\x00'}, {0x20, "6d643573756d992e"}, {0x20, 'lo)ppp0'}, {0x20, '/dev/null\x00'}], 0xa, "cfe81483e709d69adc85b24d7f7362c8109c06dbf4c611c9c1c457395502404f49760a4510df0bf695d06c5f52f1bebe4e45f94cb8221971099b1a0162a8e3889758ee318ef32b9f5790cdeae5d3bd667d3b984d468bbd313d611fefde32e11511f6a4375f9021"}, 0x99) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 07:42:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x68010000}) 07:42:55 executing program 6 (fault-call:12 fault-nth:0): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0xa, 0x8) syz_emit_ethernet(0x32, &(0x7f000018f000)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000040)=0x6, 0x4) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)=""/13, 0xfffffffffffffd9c}, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xb9) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000500)=""/207) sendfile(r0, r2, &(0x7f0000000300), 0x8000fffffffe) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)=0xff, 0x4) getpid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}}}, &(0x7f0000000800)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000840)) geteuid() gettid() getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003840)={{{@in6=@remote, @in6=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003940)=0xe8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003d40)) stat(&(0x7f0000004380)='./bus\x00', &(0x7f00000043c0)) 07:42:55 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000015, 0x0) 07:42:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x16a, 0x7000000) 07:42:55 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0xd6, 0x2b) 07:42:55 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x630000) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x0, 0x4, 0x3ff, 0x6}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)=0x80000000, 0x4) r2 = socket$inet6(0xa, 0x4, 0xc) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000002000030006000000000002000000e0000001000000000000000008001200020002000000000000000000300000000b0300000000000f0000000000000000000000000000000000000001ac1414bb0080f88f158549a52c33336adb9b00000000000000000000030005000000000002000000"], 0x80}}, 0x0) [ 695.880662] 9pnet_virtio: no channels available for device / [ 695.914346] XFS (loop3): Invalid superblock magic number [ 695.963866] FAULT_INJECTION: forcing a failure. [ 695.963866] name failslab, interval 1, probability 0, space 0, times 0 [ 695.975509] CPU: 1 PID: 22416 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 695.984016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.993376] Call Trace: [ 695.995984] dump_stack+0x1c9/0x2b4 [ 695.999638] ? dump_stack_print_info.cold.2+0x52/0x52 [ 696.004848] ? mark_held_locks+0x160/0x160 [ 696.009120] should_fail.cold.4+0xa/0x11 [ 696.013209] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 696.018332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 696.023119] ? lockdep_hardirqs_on+0x421/0x5c0 [ 696.027715] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 696.032659] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 696.037435] ? graph_lock+0x170/0x170 [ 696.041263] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 696.046049] ? retint_kernel+0x10/0x10 [ 696.049979] ? rcu_all_qs+0x60/0x2d0 [ 696.053720] ? rcu_note_context_switch+0x680/0x680 [ 696.058671] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 696.064146] __should_failslab+0x124/0x180 [ 696.068402] should_failslab+0x9/0x14 [ 696.072225] kmem_cache_alloc_trace+0x2b5/0x730 [ 696.076910] ? mark_held_locks+0xc9/0x160 [ 696.081072] ? aa_file_perm+0x498/0xfc0 [ 696.085076] alloc_pipe_info+0x16b/0x590 [ 696.089169] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 696.094126] ? pipe_read+0x940/0x940 [ 696.097851] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 696.103330] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 696.108279] ? common_file_perm+0x22a/0x7e0 [ 696.112635] splice_direct_to_actor+0x6fc/0x8f0 [ 696.117321] ? graph_lock+0x170/0x170 [ 696.121143] ? pipe_to_sendpage+0x400/0x400 [ 696.125489] ? apparmor_file_permission+0x24/0x30 [ 696.130351] ? do_splice_to+0x190/0x190 [ 696.134341] ? security_file_permission+0x1c2/0x230 [ 696.139381] ? rw_verify_area+0x118/0x360 [ 696.143555] do_splice_direct+0x2d4/0x420 [ 696.147724] ? splice_direct_to_actor+0x8f0/0x8f0 [ 696.152594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.158160] ? __sb_start_write+0x17f/0x300 07:42:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x4f, 0x7000000) 07:42:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x4]}}]}, 0x68}}, 0x0) 07:42:55 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000001e, 0x0) [ 696.162496] do_sendfile+0x62a/0xe20 [ 696.166233] ? do_compat_pwritev64+0x1c0/0x1c0 [ 696.170838] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.176394] ? _copy_from_user+0xdf/0x150 [ 696.180559] __x64_sys_sendfile64+0x15d/0x250 [ 696.185067] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 696.189683] do_syscall_64+0x1b9/0x820 [ 696.193587] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 696.198977] ? syscall_return_slowpath+0x5e0/0x5e0 [ 696.203916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.208771] ? trace_hardirqs_on_caller+0x2b0/0x2b0 07:42:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0xfc, 0x7000000) [ 696.213802] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 696.218835] ? prepare_exit_to_usermode+0x291/0x3b0 [ 696.223870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.228732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.233932] RIP: 0033:0x457099 [ 696.237136] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.256052] RSP: 002b:00007fa7ba560c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 696.263788] RAX: ffffffffffffffda RBX: 00007fa7ba5616d4 RCX: 0000000000457099 [ 696.271066] RDX: 0000000020000300 RSI: 0000000000000006 RDI: 0000000000000003 [ 696.278352] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 696.285639] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000007 [ 696.292945] R13: 00000000004d4428 R14: 00000000004c8b10 R15: 0000000000000000 07:42:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x10000c0}) 07:42:55 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x900) 07:42:55 executing program 6 (fault-call:12 fault-nth:1): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0xa, 0x8) syz_emit_ethernet(0x32, &(0x7f000018f000)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000040)=0x6, 0x4) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)=""/13, 0xfffffffffffffd9c}, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xb9) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000500)=""/207) sendfile(r0, r2, &(0x7f0000000300), 0x8000fffffffe) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)=0xff, 0x4) getpid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}}}, &(0x7f0000000800)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000840)) geteuid() gettid() getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003840)={{{@in6=@remote, @in6=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003940)=0xe8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003d40)) stat(&(0x7f0000004380)='./bus\x00', &(0x7f00000043c0)) 07:42:55 executing program 5: r0 = socket$inet6(0xa, 0x1400000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x90080) r3 = syz_genetlink_get_family_id$team(&(0x7f0000004f00)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000006c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000700)=0xc) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/134, 0x86}, {&(0x7f00000008c0)=""/17, 0x11}], 0x3, &(0x7f0000000940)=""/96, 0x60, 0x7ff}, 0x9}, {{&(0x7f00000009c0)=@nl=@unspec, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000a40)=""/238, 0xee}, {&(0x7f0000000b40)=""/243, 0xf3}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/122, 0x7a}], 0x4, &(0x7f0000000d40)=""/239, 0xef, 0x9}, 0x1}, {{&(0x7f0000000e40)=@nfc_llcp, 0x80, &(0x7f0000001380)=[{&(0x7f0000000ec0)=""/33, 0x21}, {&(0x7f0000000f00)=""/175, 0xaf}, {&(0x7f0000000fc0)=""/96, 0x60}, {&(0x7f0000001040)=""/138, 0x8a}, {&(0x7f0000001100)=""/58, 0x3a}, {&(0x7f0000001140)=""/139, 0x8b}, {&(0x7f0000001200)=""/156, 0x9c}, {&(0x7f00000012c0)=""/191, 0xbf}], 0x8, &(0x7f0000001400)=""/53, 0x35, 0x1}, 0x2}, {{&(0x7f0000001440)=@sco, 0x80, &(0x7f0000002a40)=[{&(0x7f00000014c0)=""/11, 0xb}, {&(0x7f0000001500)=""/42, 0x2a}, {&(0x7f0000001540)=""/199, 0xc7}, {&(0x7f0000001640)=""/136, 0x88}, {&(0x7f0000001700)=""/239, 0xef}, {&(0x7f0000001800)=""/30, 0x1e}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000002840)=""/123, 0x7b}, {&(0x7f00000028c0)=""/166, 0xa6}, {&(0x7f0000002980)=""/164, 0xa4}], 0xa, &(0x7f0000002b00)=""/176, 0xb0, 0x4}, 0x3}, {{&(0x7f0000002bc0)=@ax25, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002c40)=""/167, 0xa7}, {&(0x7f0000002d00)=""/102, 0x66}, {&(0x7f0000002d80)=""/138, 0x8a}, {&(0x7f0000002e40)=""/219, 0xdb}], 0x4, &(0x7f0000002f80)=""/148, 0x94}, 0x5d5}, {{&(0x7f0000003040)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f00000030c0)=""/137, 0x89}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/3, 0x3}, {&(0x7f00000041c0)=""/197, 0xc5}, {&(0x7f00000042c0)=""/8, 0x8}, {&(0x7f0000004300)=""/95, 0x5f}, {&(0x7f0000004380)=""/121, 0x79}, {&(0x7f0000004400)=""/178, 0xb2}], 0x8, &(0x7f0000004540)=""/21, 0x15, 0xfffffffffffffffc}, 0x1a}], 0x6, 0x40000000, &(0x7f0000004700)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004780)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000047c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000004840)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000004880)={@empty, @broadcast, 0x0}, &(0x7f00000048c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000049c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004a00)=0x14, 0x80800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004a40)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004b80)={{{@in6=@ipv4={[], [], @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004c80)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000004d80)={@remote, 0x0}, &(0x7f0000004dc0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004e00)={'ipddp0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004e40)={'vcan0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004ec0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005000)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000005100)={@local, 0x0}, &(0x7f0000005140)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005180)={0x0, @rand_addr, @loopback}, &(0x7f00000051c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005200)={0x0, @remote, @remote}, &(0x7f0000005240)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000052c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000005300)={@local, 0x0}, &(0x7f0000005340)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000005380)={@remote, 0x0}, &(0x7f00000053c0)=0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000056c0)={&(0x7f0000005400)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000055c0)=[{&(0x7f0000005480)=""/27, 0x1b}, {&(0x7f00000054c0)=""/242, 0xf2}], 0x2, &(0x7f0000005600)=""/165, 0xa5, 0x5}, 0x40000020) getpeername$packet(0xffffffffffffff9c, &(0x7f00000059c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000006380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000006340)={&(0x7f0000005a40)={0x8c4, r3, 0x100, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x174, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x230, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x7, 0xffffffffffffffff, 0x4, 0x8001}, {0x0, 0x0, 0xb3, 0x146}, {0x8, 0x7, 0x6, 0x3}, {0x9, 0x80000001, 0x5ab7, 0x1}, {0x5, 0x6, 0xffffffff00000001, 0xc794}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r16}, {0x138, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffe00}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x1a8, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfec}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff3660}}}]}}, {{0x8, 0x1, r24}, {0x1b8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r26}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4, 0x7, 0xdbf, 0x9}, {0x9, 0x8, 0x0, 0x10000}, {0x8, 0x6, 0x2, 0x7}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}]}, 0x8c4}, 0x1, 0x0, 0x0, 0x4}, 0x8004) 07:42:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}]}, 0x68}}, 0x0) 07:42:55 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1ab, 0x2b) [ 696.450804] XFS (loop3): unknown mount option [À]. [ 696.511021] XFS (loop3): unknown mount option [À]. 07:42:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x3b, 0x7000000) 07:42:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xd70c0000}) [ 696.577985] 9pnet_virtio: no channels available for device / 07:42:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x68}}, 0x0) 07:42:56 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x9b, 0x2b) 07:42:56 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x60) [ 696.720902] FAULT_INJECTION: forcing a failure. [ 696.720902] name failslab, interval 1, probability 0, space 0, times 0 [ 696.732949] CPU: 0 PID: 22484 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 696.741467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.750827] Call Trace: [ 696.753432] dump_stack+0x1c9/0x2b4 [ 696.757072] ? dump_stack_print_info.cold.2+0x52/0x52 [ 696.762310] should_fail.cold.4+0xa/0x11 [ 696.766391] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 696.771514] ? save_stack+0x43/0xd0 [ 696.775154] ? kasan_kmalloc+0xc4/0xe0 [ 696.779050] ? kmem_cache_alloc_trace+0x152/0x730 [ 696.783910] ? alloc_pipe_info+0x16b/0x590 [ 696.788164] ? splice_direct_to_actor+0x6fc/0x8f0 [ 696.793024] ? graph_lock+0x170/0x170 [ 696.796845] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.802228] ? find_held_lock+0x36/0x1c0 [ 696.806312] ? __lock_is_held+0xb5/0x140 [ 696.810410] ? check_same_owner+0x340/0x340 [ 696.814752] ? rcu_note_context_switch+0x680/0x680 [ 696.819712] __should_failslab+0x124/0x180 [ 696.823963] should_failslab+0x9/0x14 [ 696.827776] __kmalloc+0x2b2/0x720 [ 696.831334] ? kmem_cache_alloc_trace+0x324/0x730 [ 696.836193] ? alloc_pipe_info+0x29e/0x590 [ 696.840449] alloc_pipe_info+0x29e/0x590 [ 696.844536] ? pipe_read+0x940/0x940 [ 696.848284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 696.853072] splice_direct_to_actor+0x6fc/0x8f0 [ 696.857784] ? pipe_to_sendpage+0x400/0x400 [ 696.862344] ? security_file_permission+0x91/0x230 [ 696.867295] ? do_splice_to+0x190/0x190 [ 696.871286] ? security_file_permission+0x1c2/0x230 [ 696.876324] ? rw_verify_area+0x118/0x360 [ 696.880489] do_splice_direct+0x2d4/0x420 [ 696.884653] ? splice_direct_to_actor+0x8f0/0x8f0 [ 696.889609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.895160] ? __sb_start_write+0x17f/0x300 [ 696.899505] do_sendfile+0x62a/0xe20 [ 696.903252] ? do_compat_pwritev64+0x1c0/0x1c0 [ 696.907866] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.913413] ? _copy_from_user+0xdf/0x150 [ 696.917573] __x64_sys_sendfile64+0x15d/0x250 [ 696.922078] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 696.926706] do_syscall_64+0x1b9/0x820 [ 696.930604] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 696.935980] ? syscall_return_slowpath+0x5e0/0x5e0 [ 696.940920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.945774] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 696.950812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.956366] ? prepare_exit_to_usermode+0x291/0x3b0 [ 696.961403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.966262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.971458] RIP: 0033:0x457099 [ 696.974665] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.993570] RSP: 002b:00007fa7ba560c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 697.001290] RAX: ffffffffffffffda RBX: 00007fa7ba5616d4 RCX: 0000000000457099 [ 697.008566] RDX: 0000000020000300 RSI: 0000000000000006 RDI: 0000000000000003 07:42:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x15a, 0x7000000) 07:42:56 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0xce, 0x2b) 07:42:56 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x4000000000000) 07:42:56 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000023, 0x0) 07:42:56 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x91, 0x2b) 07:42:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x84, 0x7000000) [ 697.015839] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 697.023126] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000007 [ 697.030407] R13: 00000000004d4428 R14: 00000000004c8b10 R15: 0000000000000001 07:42:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x2aef456, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000240)="34eb2f6510c3b953ebde48742388d097890459ee6f7512388335bc75a023df1b9a7f7256745b6a85561c531b30db555ce8ff13b5e3f3d32f6f1cef236317b569099dd47191d0ae3f5ffe22fd6f") fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f00000002c0)='\')%\x00', 0x4, 0x3) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) r4 = accept(r0, 0x0, &(0x7f00000003c0)) bind$xdp(r2, &(0x7f0000000400)={0x2c, 0x4, r3, 0x37, r4}, 0x10) r5 = socket$key(0xf, 0x3, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4080, 0x0) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 697.142593] XFS (loop3): Invalid superblock magic number 07:42:56 executing program 6 (fault-call:12 fault-nth:2): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0xa, 0x8) syz_emit_ethernet(0x32, &(0x7f000018f000)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000040)=0x6, 0x4) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)=""/13, 0xfffffffffffffd9c}, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xb9) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000500)=""/207) sendfile(r0, r2, &(0x7f0000000300), 0x8000fffffffe) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)=0xff, 0x4) getpid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}}}, &(0x7f0000000800)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000840)) geteuid() gettid() getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003840)={{{@in6=@remote, @in6=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003940)=0xe8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003d40)) stat(&(0x7f0000004380)='./bus\x00', &(0x7f00000043c0)) 07:42:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}]}, 0x68}}, 0x0) 07:42:56 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x4, 0x2b) 07:42:56 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000010, 0x0) 07:42:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x7000000) 07:42:56 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x8dffffff00000000) 07:42:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x7000000}) 07:42:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = accept(r0, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000240)=0x80) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)=ANY=[@ANYBLOB="e0000002ac1414bb0000000009000000ffff03ffd8000098c200006cef9b01ac141412e0220002"], 0x34) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x80002) ioctl$TCGETS(r2, 0x5401, &(0x7f00000000c0)) socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)={0x2, 0xd, 0x0, 0x0, 0x16, 0x0, 0x0, 0x80000000000000, [@sadb_spirange={0x2, 0x10, 0x4d3, 0x4d5}, @sadb_x_sec_ctx={0x12, 0x18, 0x800, 0x3280000000000000, 0x83, "a78ed39abc20565f1aa90ce3247e87fa99e0a5809bca7bf00f1984db487149396440bd09ad9486e0a1f59428c6327f19ee107b1d8282faa213a1b175344ba6b759618f983c1c12863783e9dca02f29cb6787e8a2a315ab1ad30bfd4abb68197ccdf2b04506a30196fd5ba09f8f310ecdcfaad3da0d9837edf40704fc6e19c7aa8067e7"}]}, 0xb0}}, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x202) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x230000, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) 07:42:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x4000000]}}]}, 0x68}}, 0x0) [ 697.393846] 9pnet_virtio: no channels available for device / 07:42:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x7000000) 07:42:56 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x96, 0x2b) 07:42:56 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000001a, 0x0) 07:42:56 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xffff}, &(0x7f0000000340)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={r1, 0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$key(0xf, 0x3, 0x2) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4c8080, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000240)={r5, 0xe7, "dad4cb459ec1e1b9834fa4294debb0fc7e24b8b09b1d4a3e63860fe07d949702c6e9cb96dd74f6fe022e04417772b235d9e8398067870d4fc49953ca3998df327d9b90b27be70dd5d28eb8edf385029f6406873661dd0d5dc5bb1020a9fc4932af40353a4155c8a27fe96627ced66633cf7e9af116dc906e564ea04bff134fe47899625a1cf8dee7de6af8282dc3793f1875f406cf152d282a6307b2533309867ec54740fba0f6f4aa96dd55c30183a7690cc7de2b831cb0f273dc3529910c91c006838fdfab794440a33654f34711da34b2a489442b547c19503a15822b920c5948997b6b50f7"}, &(0x7f0000000140)=0xef) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 697.468644] XFS (loop3): Invalid superblock magic number 07:42:56 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x40000) [ 697.581664] FAULT_INJECTION: forcing a failure. [ 697.581664] name failslab, interval 1, probability 0, space 0, times 0 [ 697.593548] CPU: 1 PID: 22598 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 697.602053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.611420] Call Trace: [ 697.614027] dump_stack+0x1c9/0x2b4 [ 697.617672] ? dump_stack_print_info.cold.2+0x52/0x52 [ 697.622888] should_fail.cold.4+0xa/0x11 [ 697.626970] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 697.632129] ? save_stack+0x43/0xd0 [ 697.635775] ? kasan_kmalloc+0xc4/0xe0 [ 697.639676] ? kmem_cache_alloc_trace+0x152/0x730 [ 697.644529] ? alloc_pipe_info+0x16b/0x590 [ 697.648778] ? splice_direct_to_actor+0x6fc/0x8f0 [ 697.653639] ? graph_lock+0x170/0x170 [ 697.657455] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.662853] ? find_held_lock+0x36/0x1c0 [ 697.666936] ? __lock_is_held+0xb5/0x140 [ 697.671033] ? check_same_owner+0x340/0x340 [ 697.675376] ? rcu_note_context_switch+0x680/0x680 07:42:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}]}, 0x68}}, 0x0) 07:42:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0xc000000}) [ 697.680329] __should_failslab+0x124/0x180 [ 697.684581] should_failslab+0x9/0x14 [ 697.688406] __kmalloc+0x2b2/0x720 [ 697.691954] ? kmem_cache_alloc_trace+0x324/0x730 [ 697.696809] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 697.701753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 697.706523] ? alloc_pipe_info+0x29e/0x590 [ 697.710776] alloc_pipe_info+0x29e/0x590 [ 697.714856] ? pipe_read+0x940/0x940 [ 697.718584] ? splice_direct_to_actor+0xf6/0x8f0 [ 697.723348] splice_direct_to_actor+0x6fc/0x8f0 [ 697.728188] ? pipe_to_sendpage+0x400/0x400 [ 697.732527] ? apparmor_file_permission+0x24/0x30 [ 697.737359] ? do_splice_to+0x190/0x190 [ 697.741329] ? security_file_permission+0x1c2/0x230 [ 697.746338] ? rw_verify_area+0x118/0x360 [ 697.750497] do_splice_direct+0x2d4/0x420 [ 697.754649] ? splice_direct_to_actor+0x8f0/0x8f0 [ 697.759489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.765014] ? __sb_start_write+0x17f/0x300 [ 697.769341] do_sendfile+0x62a/0xe20 [ 697.773060] ? do_compat_pwritev64+0x1c0/0x1c0 [ 697.777667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.783204] ? _copy_from_user+0xdf/0x150 [ 697.787353] __x64_sys_sendfile64+0x15d/0x250 [ 697.791835] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 697.796413] do_syscall_64+0x1b9/0x820 [ 697.800293] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 697.805658] ? syscall_return_slowpath+0x5e0/0x5e0 [ 697.810585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 697.815417] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 697.820423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.825951] ? prepare_exit_to_usermode+0x291/0x3b0 [ 697.830976] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 697.835816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.840996] RIP: 0033:0x457099 [ 697.844240] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.863138] RSP: 002b:00007fa7ba560c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 697.870828] RAX: ffffffffffffffda RBX: 00007fa7ba5616d4 RCX: 0000000000457099 [ 697.878096] RDX: 0000000020000300 RSI: 0000000000000006 RDI: 0000000000000003 [ 697.885365] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 697.892622] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000007 [ 697.899874] R13: 00000000004d4428 R14: 00000000004c8b10 R15: 0000000000000002 07:42:57 executing program 6 (fault-call:12 fault-nth:3): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0xa, 0x8) syz_emit_ethernet(0x32, &(0x7f000018f000)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000040)=0x6, 0x4) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)=""/13, 0xfffffffffffffd9c}, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xb9) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000500)=""/207) sendfile(r0, r2, &(0x7f0000000300), 0x8000fffffffe) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)=0xff, 0x4) getpid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}}}, &(0x7f0000000800)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000840)) geteuid() gettid() getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003840)={{{@in6=@remote, @in6=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003940)=0xe8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003d40)) stat(&(0x7f0000004380)='./bus\x00', &(0x7f00000043c0)) 07:42:57 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x7000000) 07:42:57 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000022, 0x0) 07:42:57 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x18c, 0x2b) 07:42:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d00001000000000000000000010000300160000000000020000944a4433fd841a5214edc800e000000100000000000000000800120002000200000000000000000030000000030300000000000f00000000000000000000000000000000000000010000030005000000000002000000e0000000000000000000000000000083311153f76b7d29882c286d6857dda7179e7e"], 0x80}}, 0x0) 07:42:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x68}}, 0x0) 07:42:57 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x1a2, 0x7000000) [ 698.087797] 9pnet_virtio: no channels available for device / 07:42:57 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x17c, 0x2b) [ 698.136586] XFS (loop3): Invalid superblock magic number [ 698.264798] FAULT_INJECTION: forcing a failure. [ 698.264798] name failslab, interval 1, probability 0, space 0, times 0 [ 698.276428] CPU: 1 PID: 22661 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 698.284933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.294287] Call Trace: [ 698.296892] dump_stack+0x1c9/0x2b4 [ 698.300538] ? dump_stack_print_info.cold.2+0x52/0x52 [ 698.305751] ? cpu_clock_event_start+0x12c/0x180 [ 698.310527] ? task_clock_event_start+0x1f0/0x1f0 [ 698.315399] should_fail.cold.4+0xa/0x11 [ 698.319482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 698.324607] ? __lock_acquire+0x7fc/0x5020 [ 698.328867] ? graph_lock+0x170/0x170 [ 698.332687] ? mark_page_accessed+0x672/0xd30 [ 698.337204] ? find_held_lock+0x36/0x1c0 [ 698.341285] ? __lock_is_held+0xb5/0x140 [ 698.345370] ? check_same_owner+0x340/0x340 [ 698.349709] ? rcu_note_context_switch+0x680/0x680 [ 698.354653] ? iov_iter_alignment+0x1f9/0xc20 [ 698.359172] __should_failslab+0x124/0x180 [ 698.363428] should_failslab+0x9/0x14 [ 698.367245] kmem_cache_alloc+0x29c/0x710 [ 698.371422] do_blockdev_direct_IO+0x62d/0x9db0 [ 698.376130] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 698.381788] ? do_direct_IO+0xc220/0xc220 [ 698.385969] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 698.390654] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 698.395354] ? __kernel_text_address+0xd/0x40 [ 698.399865] ? unwind_get_return_address+0x61/0xa0 [ 698.404832] ? save_stack+0xa9/0xd0 [ 698.408482] ? save_stack+0x1c/0xd0 07:42:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x68}}, 0x0) 07:42:57 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x115000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000004d, 0x6000) 07:42:57 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000026, 0x0) [ 698.412127] ? __kasan_slab_free+0x11a/0x170 [ 698.416543] ? kasan_slab_free+0xe/0x10 [ 698.420532] ? print_usage_bug+0xc0/0xc0 [ 698.424615] ? generic_update_time+0x26a/0x450 [ 698.429216] ? touch_atime+0x29c/0x320 [ 698.433132] ? generic_file_read_iter+0x201e/0x2f20 [ 698.438168] ? ext4_file_read_iter+0x18b/0x3c0 [ 698.442768] ? generic_file_splice_read+0x5a5/0x9a0 [ 698.447791] ? do_splice_to+0x12e/0x190 [ 698.451770] ? splice_direct_to_actor+0x270/0x8f0 [ 698.456628] ? do_splice_direct+0x2d4/0x420 [ 698.460963] ? do_sendfile+0x62a/0xe20 07:42:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000f80)='xfs\x00', &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@noattr2='noattr2'}], 0x6000000}) 07:42:57 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1b3, 0x2b) 07:42:57 executing program 5: r0 = socket$inet6(0xa, 0xfffffffffffffffa, 0x10004) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000080)=0xfff) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x107002) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = socket$key(0xf, 0x3, 0x2) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x208000, 0x0) sendmsg$key(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x800}, &(0x7f0000000140)=0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000540)={"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"}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000180)={r4, 0x5a77}, &(0x7f00000001c0)=0x8) [ 698.464861] ? __x64_sys_sendfile64+0x15d/0x250 [ 698.469538] ? do_syscall_64+0x1b9/0x820 [ 698.473616] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.478992] ? trace_hardirqs_on+0x2c0/0x2c0 [ 698.483415] ? kasan_check_write+0x14/0x20 [ 698.487667] ? graph_lock+0x170/0x170 [ 698.491486] ? __lock_acquire+0x7fc/0x5020 [ 698.495735] ? kmem_cache_free+0xa0/0x280 [ 698.499902] ? mark_held_locks+0x160/0x160 [ 698.504149] ? jbd2_journal_stop+0x443/0x1600 [ 698.508658] ? rcu_read_lock_sched_held+0x108/0x120 [ 698.513688] ? kmem_cache_free+0x246/0x280 [ 698.517934] ? jbd2_journal_stop+0x22f/0x1600 [ 698.522445] ? jbd2_journal_get_write_access+0xa5/0xc0 [ 698.527745] ? jbd2_buffer_abort_trigger+0x90/0x90 [ 698.532690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.538245] ? ext4_reserve_inode_write+0x146/0x260 [ 698.543284] ? ext4_dirty_inode+0x97/0xc0 [ 698.547441] ? print_usage_bug+0xc0/0xc0 [ 698.551513] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 698.556453] ? graph_lock+0x170/0x170 [ 698.560264] ? graph_lock+0x170/0x170 [ 698.564087] ? ext4_setattr+0x2850/0x2850 [ 698.568251] ? __ext4_journal_start_sb+0x195/0x590 [ 698.570132] divide error: 0000 [#1] SMP KASAN [ 698.573196] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 698.577691] CPU: 0 PID: 22701 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 698.582429] ? ext4_dirty_inode+0x62/0xc0 [ 698.590896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.595033] ? lock_acquire+0x1e4/0x4f0 [ 698.604378] RIP: 0010:nbd_ioctl+0x53c/0xcf0 [ 698.608332] ? ext4_direct_IO+0x66e/0x2000 [ 698.612634] Code: ea 03 80 3c 02 00 0f 85 1c 07 00 00 48 8b b5 c0 fe ff ff 48 63 8d b8 fe ff ff 48 8b 86 c8 00 00 00 48 8d be c0 00 00 00 48 99 <48> f7 f9 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c [ 698.616853] ? lock_release+0x9f0/0x9f0 [ 698.635739] RSP: 0018:ffff88019255f828 EFLAGS: 00010246 [ 698.639708] ? check_same_owner+0x340/0x340 [ 698.639727] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 698.645071] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 698.649395] ? rcu_note_context_switch+0x680/0x680 [ 698.654818] RDX: 0000000000000000 RSI: ffff8801c9964ac0 RDI: ffff8801c9964b80 [ 698.662098] ? down_read+0xb5/0x1d0 [ 698.667008] RBP: ffff88019255f9a0 R08: ffff8801afcfc3c0 R09: ffffed003a592bb5 [ 698.674280] ? ext4_direct_IO+0x66e/0x2000 [ 698.677882] R10: ffff88019255f818 R11: ffff8801d2c95daf R12: ffff8801d2c95cc0 [ 698.685156] ? __down_interruptible+0x700/0x700 [ 698.689368] R13: 00000000ffffffe7 R14: ffff8801d2c95da0 R15: ffff8801da806040 [ 698.696635] ? __lock_is_held+0xb5/0x140 [ 698.701282] FS: 00007fe72263a700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 698.708561] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 698.712594] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 698.720822] __blockdev_direct_IO+0x9d/0xc6 [ 698.726430] CR2: 0000001b33021000 CR3: 00000001c4de7000 CR4: 00000000001406f0 [ 698.732309] ext4_direct_IO+0xf1e/0x2000 [ 698.736603] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 698.743874] ? ext4_iomap_end+0x810/0x810 [ 698.747903] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 698.755170] ? __lock_is_held+0xb5/0x140 [ 698.759291] Call Trace: [ 698.766565] ? __sb_end_write+0xac/0xe0 [ 698.770608] ? nbd_release+0x140/0x140 [ 698.773179] ? touch_atime+0x103/0x320 [ 698.777138] ? graph_lock+0x170/0x170 [ 698.781010] ? file_remove_privs+0x530/0x530 [ 698.784882] ? do_futex+0x249/0x27d0 [ 698.788666] ? file_remove_privs+0x530/0x530 [ 698.793067] ? kasan_check_read+0x11/0x20 [ 698.796759] ? atime_needs_update+0x710/0x710 [ 698.801154] ? finish_task_switch+0x1d3/0x870 [ 698.805287] ? filemap_check_errors+0xd8/0x110 [ 698.809763] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 698.814245] generic_file_read_iter+0x515/0x2f20 [ 698.818808] ? compat_start_thread+0x80/0x80 [ 698.823892] ? print_usage_bug+0xc0/0xc0 [ 698.828627] ? find_held_lock+0x36/0x1c0 [ 698.833019] ? perf_swevent_start_hrtimer.part.77+0x19a/0x260 [ 698.837060] ? nbd_release+0x140/0x140 [ 698.841112] ? filemap_range_has_page+0x3e0/0x3e0 [ 698.846985] blkdev_ioctl+0x9cd/0x2030 [ 698.850850] ? print_usage_bug+0xc0/0xc0 [ 698.855675] ? blkpg_ioctl+0xc40/0xc40 [ 698.860019] ? __lock_acquire+0x7fc/0x5020 [ 698.864065] ? __switch_to_asm+0x40/0x70 [ 698.867933] ? cpu_clock_event_start+0x12c/0x180 [ 698.872150] ? kasan_check_read+0x11/0x20 [ 698.876197] ? task_clock_event_start+0x1f0/0x1f0 [ 698.880937] ? rcu_is_watching+0x8c/0x150 [ 698.885071] ? perf_event_set_state.part.66+0x12f/0x1f0 [ 698.889899] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 698.894027] ? __lock_acquire+0x7fc/0x5020 [ 698.899372] ? __fget+0x4d5/0x740 [ 698.904019] ? mark_held_locks+0xc9/0x160 [ 698.908239] ? ksys_dup3+0x690/0x690 [ 698.911673] ? print_usage_bug+0xc0/0xc0 [ 698.915803] ? trace_hardirqs_on+0x2c0/0x2c0 [ 698.919498] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 698.923537] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 698.927926] ? mark_held_locks+0x160/0x160 [ 698.932664] block_ioctl+0xee/0x130 [ 698.937398] ? graph_lock+0x170/0x170 [ 698.941614] ? blkdev_fallocate+0x400/0x400 [ 698.945226] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 698.949006] do_vfs_ioctl+0x1de/0x1720 [ 698.953307] ? lockdep_hardirqs_on+0x421/0x5c0 [ 698.958042] ? ioctl_preallocate+0x300/0x300 [ 698.961912] ? retint_kernel+0x10/0x10 [ 698.966477] ? __fget_light+0x2f7/0x440 [ 698.970865] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 698.974731] ? __schedule+0x1df0/0x1df0 [ 698.978692] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 698.983602] ? fget_raw+0x20/0x20 [ 698.987559] ? print_usage_bug+0xc0/0xc0 [ 698.992295] ? trace_hardirqs_off+0xb8/0x2b0 [ 698.995730] ? find_held_lock+0x36/0x1c0 [ 698.999773] ? __x64_sys_futex+0x47f/0x6a0 [ 699.004159] ? lock_downgrade+0x8f0/0x8f0 [ 699.008204] ? do_syscall_64+0x9a/0x820 [ 699.012415] ? graph_lock+0x170/0x170 [ 699.016544] ? do_syscall_64+0x9a/0x820 [ 699.020502] ? mark_held_locks+0xc9/0x160 [ 699.024283] ? lockdep_hardirqs_on+0x421/0x5c0 [ 699.028241] ? rcu_is_watching+0x8c/0x150 [ 699.032373] ? security_file_ioctl+0x94/0xc0 [ 699.036936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 699.041063] ksys_ioctl+0xa9/0xd0 [ 699.045454] ? lockdep_hardirqs_on+0x421/0x5c0 [ 699.050190] __x64_sys_ioctl+0x73/0xb0 [ 699.053630] ? retint_kernel+0x10/0x10 [ 699.058194] do_syscall_64+0x1b9/0x820 [ 699.062064] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 699.065934] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.069800] ? find_held_lock+0x36/0x1c0 [ 699.074714] ? syscall_return_slowpath+0x5e0/0x5e0 [ 699.080054] ? lock_downgrade+0x8f0/0x8f0 [ 699.084106] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 699.089014] ? retint_kernel+0x10/0x10 [ 699.093147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 699.098143] ? aa_file_perm+0x480/0xfc0 [ 699.102019] ? recalc_sigpending_tsk+0x180/0x180 [ 699.107019] ? aa_file_perm+0x498/0xfc0 [ 699.110983] ? kasan_check_write+0x14/0x20 [ 699.115716] ? aa_path_link+0x4e0/0x4e0 [ 699.119679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.123888] ? graph_lock+0x170/0x170 [ 699.127848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.132671] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 699.136450] RIP: 0033:0x457099 [ 699.141627] ? __lockdep_init_map+0x105/0x590 [ 699.146275] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.149447] ? lockdep_init_map+0x9/0x10 [ 699.153917] RSP: 002b:00007fe722639c78 EFLAGS: 00000246 [ 699.172820] ? debug_mutex_init+0x2d/0x60 [ 699.176848] ORIG_RAX: 0000000000000010 [ 699.182205] ? __mutex_init+0x1f7/0x290 [ 699.186330] RAX: ffffffffffffffda RBX: 00007fe72263a6d4 RCX: 0000000000457099 [ 699.190291] ? __lock_is_held+0xb5/0x140 [ 699.194244] RDX: 0000000000000000 RSI: 000000000000ab01 RDI: 0000000000000003 [ 699.201503] ? __ia32_sys_membarrier+0x150/0x150 [ 699.205539] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 699.212806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.217534] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 699.224795] ? fsnotify+0xbac/0x14e0 [ 699.230308] R13: 00000000004cfa00 R14: 00000000004c5c46 R15: 0000000000000000 [ 699.237566] ext4_file_read_iter+0x18b/0x3c0 [ 699.241252] Modules linked in: [ 699.248518] generic_file_splice_read+0x5a5/0x9a0 [ 699.256075] ? add_to_pipe+0x360/0x360 [ 699.260893] Dumping ftrace buffer: [ 699.264776] ? rw_verify_area+0x118/0x360 [ 699.268279] --------------------------------- [ 699.272420] ? add_to_pipe+0x360/0x360 [ 699.276920] syz-exec-8760 0...2 287259741us : 0: u00000000f4447991 [ 699.280764] do_splice_to+0x12e/0x190 [ 699.280776] syz-exec-8760 0...2 287259760us : 0: u00000000f4447991 [ 699.287435] splice_direct_to_actor+0x270/0x8f0 [ 699.291222] syz-exec-8760 0...2 287259766us : 0: u00000000f4447991 [ 699.297861] ? pipe_to_sendpage+0x400/0x400 [ 699.302517] syz-exec-8760 0...2 287259771us : 0: u00000000f4447991 [ 699.309159] ? do_splice_to+0x190/0x190 [ 699.313468] syz-exec-8760 0...2 287259777us : 0: u00000000f4447991 [ 699.320124] ? security_file_permission+0x1c2/0x230 [ 699.324091] syz-exec-8760 0...2 287259781us : 0: u00000000f4447991 [ 699.330733] ? rw_verify_area+0x118/0x360 [ 699.335732] syz-exec-8760 0...2 287259787us : 0: u00000000f4447991 [ 699.342375] do_splice_direct+0x2d4/0x420 [ 699.346517] syz-exec-8760 0...2 287259792us : 0: u00000000f4447991 [ 699.353164] ? splice_direct_to_actor+0x8f0/0x8f0 [ 699.357297] syz-exec-8760 0...2 287259797us : 0: u00000000f4447991 [ 699.363944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.368768] syz-exec-8760 0...2 287259802us : 0: u00000000f4447991 [ 699.375412] ? __sb_start_write+0x17f/0x300 [ 699.380938] syz-exec-8760 0...2 287259806us : 0: u00000000f4447991 [ 699.387580] do_sendfile+0x62a/0xe20 [ 699.391883] syz-exec-8760 0...2 287259811us : 0: u00000000f4447991 [ 699.398529] ? do_compat_pwritev64+0x1c0/0x1c0 [ 699.402229] syz-exec-8760 0...2 287259816us : 0: u00000000f4447991 [ 699.408879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 699.413448] syz-exec-8760 0...2 287259820us : 0: u00000000f4447991 [ 699.420098] ? _copy_from_user+0xdf/0x150 [ 699.425631] syz-exec-8760 0...2 287259825us : 0: u00000000f4447991 [ 699.432275] __x64_sys_sendfile64+0x15d/0x250 [ 699.436415] syz-exec-8760 0...2 287259830us : 0: u00000000f4447991 [ 699.443052] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 699.447539] syz-exec-8760 0...2 287259835us : 0: u00000000f4447991 [ 699.454180] do_syscall_64+0x1b9/0x820 [ 699.458750] syz-exec-8760 0...2 287259839us : 0: u00000000f4447991 [ 699.465393] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.469268] syz-exec-8760 0...2 287259844us : 0: u00000000f4447991 [ 699.475908] ? syscall_return_slowpath+0x5e0/0x5e0 [ 699.481260] syz-exec-8760 0...2 287259849us : 0: u00000000f4447991 [ 699.487903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.492823] syz-exec-8760 0...2 287259854us : 0: u00000000f4447991 [ 699.499458] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 699.504293] syz-exec-8760 0...2 287259858us : 0: u00000000f4447991 [ 699.510938] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 699.515939] syz-exec-8760 0...2 287259863us : 0: u00000000f4447991 [ 699.522584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.527585] syz-exec-8760 0...2 287259868us : 0: u00000000f4447991 [ 699.534230] ? prepare_exit_to_usermode+0x291/0x3b0 [ 699.539754] syz-exec-8760 0...2 287259872us : 0: u00000000f4447991 [ 699.546394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.551398] syz-exec-8760 0...2 287259877us : 0: u00000000f4447991 [ 699.558039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.562863] syz-exec-8760 0...2 287259882us : 0: u00000000f4447991 [ 699.569498] RIP: 0033:0x457099 [ 699.574676] syz-exec-8760 0...2 287259921us : 0: u00000000f4447991 [ 699.581319] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.584502] syz-exec-8760 0...2 287259928us : 0: u00000000f4447991 [ 699.591137] RSP: 002b:00007fa7ba560c78 EFLAGS: 00000246 [ 699.610041] syz-exec-8760 0...2 287259934us : 0: u00000000f4447991 [ 699.616671] ORIG_RAX: 0000000000000028 [ 699.622029] syz-exec-8760 0...2 287259938us : 0: u00000000f4447991 [ 699.628666] RAX: ffffffffffffffda RBX: 00007fa7ba5616d4 RCX: 0000000000457099 [ 699.632638] syz-exec-8760 0...2 287259944us : 0: u00000000f4447991 [ 699.639270] RDX: 0000000020000300 RSI: 0000000000000006 RDI: 0000000000000003 [ 699.646546] syz-exec-8760 0...2 287259949us : 0: u00000000f4447991 [ 699.653175] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 699.660448] syz-exec-8760 0...2 287259954us : 0: u00000000f4447991 [ 699.667076] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000007 [ 699.674356] syz-exec-8760 0...2 287259959us : 0: u00000000f4447991 [ 699.680985] R13: 00000000004d4428 R14: 00000000004c8b10 R15: 0000000000000003 [ 699.688258] syz-exec-8760 0...2 287259965us : 0: u00000000f4447991 [ 699.702173] syz-exec-8760 0...2 287259969us : 0: u00000000f4447991 [ 699.708863] syz-exec-8760 0...2 287259975us : 0: u00000000f4447991 [ 699.715557] syz-exec-8760 0...2 287259980us : 0: u00000000f4447991 [ 699.722249] syz-exec-8760 0...2 287259985us : 0: u00000000f4447991 [ 699.729410] syz-exec-8760 0...2 287259989us : 0: u00000000f4447991 [ 699.736121] syz-exec-8760 0...2 287259994us : 0: u00000000f4447991 [ 699.742815] syz-exec-8760 0...2 287259999us : 0: u00000000f4447991 [ 699.749506] syz-exec-8760 0...2 287260004us : 0: u00000000f4447991 [ 699.756192] syz-exec-8760 0...2 287260008us : 0: u00000000f4447991 [ 699.762881] syz-exec-8760 0...2 287260013us : 0: u00000000f4447991 [ 699.769574] syz-exec-8760 0...2 287260018us : 0: u00000000f4447991 [ 699.776262] syz-exec-8760 0...2 287260023us : 0: u00000000f4447991 [ 699.782954] syz-exec-8760 0...2 287260028us : 0: u00000000f4447991 [ 699.789637] syz-exec-8760 0...2 287260032us : 0: u00000000f4447991 [ 699.796332] syz-exec-8760 0...2 287260037us : 0: u00000000f4447991 [ 699.803021] syz-exec-8760 0...2 287260042us : 0: u00000000f4447991 07:42:59 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x115000) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x5, 0x3, 0x0, 0x70bd2b, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000001c, 0x0) 07:42:59 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x2dd, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x139, 0x2b) [ 699.809709] syz-exec-8760 0...2 287260047us : 0: u00000000f4447991 [ 699.816415] syz-exec-8760 0...2 287260051us : 0: u00000000f4447991 [ 699.823118] syz-exec-8760 0...2 287260056us : 0: u00000000f4447991 [ 699.829807] syz-exec-8760 0...2 287260061us : 0: u00000000f4447991 [ 699.836500] syz-exec-8760 0...2 287260065us : 0: u00000000f4447991 [ 699.843192] syz-exec-8760 0...2 287260070us : 0: u00000000f4447991 [ 699.849885] syz-exec-8760 0...2 287260075us : 0: u00000000f4447991 [ 699.856572] syz-exec-8760 0...2 287260079us : 0: u00000000f4447991 [ 699.863254] syz-exec-8760 0...2 287260085us : 0: u00000000f4447991 [ 699.869942] syz-exec-8760 0...2 287260090us : 0: u00000000f4447991 [ 699.876632] syz-exec-8760 0...2 287260095us : 0: u00000000f4447991 [ 699.883321] syz-exec-8760 0...2 287260099us : 0: u00000000f4447991 [ 699.890031] syz-exec-8760 0...2 287260105us : 0: u00000000f4447991 [ 699.896720] syz-exec-8760 0...2 287260110us : 0: u00000000f4447991 [ 699.903416] syz-exec-8760 0...2 287260116us : 0: u00000000f4447991 [ 699.910121] syz-exec-8760 0...2 287260120us : 0: u00000000f4447991 [ 699.916809] syz-exec-8760 0...2 287260126us : 0: u00000000f4447991 [ 699.923501] syz-exec-8760 0...2 287260131us : 0: u00000000f4447991 [ 699.930202] syz-exec-8760 0...2 287260136us : 0: u00000000f4447991 [ 699.936882] syz-exec-8760 0...2 287260141us : 0: u00000000f4447991 [ 699.943539] syz-exec-8760 0...2 287260146us : 0: u00000000f4447991 [ 699.950194] syz-exec-8760 0...2 287260151us : 0: u00000000f4447991 [ 699.956857] syz-exec-8760 0...2 287260155us : 0: u00000000f4447991 [ 699.963529] syz-exec-8760 0...2 287260160us : 0: u00000000f4447991 [ 699.970186] syz-exec-8760 0...2 287260165us : 0: u00000000f4447991 [ 699.976846] syz-exec-8760 0...2 287260170us : 0: u00000000f4447991 [ 699.983501] syz-exec-8760 0...2 287260175us : 0: u00000000f4447991 [ 699.990173] syz-exec-8760 0...2 287260179us : 0: u00000000f4447991 [ 699.996829] syz-exec-8760 0...2 287260184us : 0: u00000000f4447991 [ 700.003483] syz-exec-8760 0...2 287260189us : 0: u00000000f4447991 [ 700.010138] syz-exec-8760 0...2 287260194us : 0: u00000000f4447991 [ 700.016793] syz-exec-8760 0...2 287260198us : 0: u00000000f4447991 [ 700.023448] syz-exec-8760 0...2 287260203us : 0: u00000000f4447991 [ 700.030114] syz-exec-8760 0...2 287260208us : 0: u00000000f4447991 [ 700.036769] syz-exec-8760 0...2 287260212us : 0: u00000000f4447991 [ 700.043425] syz-exec-8760 0...2 287260217us : 0: u00000000f4447991 [ 700.050108] syz-exec-8760 0...2 287260222us : 0: u00000000f4447991 [ 700.056766] syz-exec-8760 0...2 287260226us : 0: u00000000f4447991 [ 700.063426] syz-exec-8760 0...2 287260231us : 0: u00000000f4447991 [ 700.070093] syz-exec-8760 0...2 287260236us : 0: u00000000f4447991 [ 700.076754] syz-exec-8760 0...2 287260241us : 0: u00000000f4447991 [ 700.083411] syz-exec-8760 0...2 287260245us : 0: u00000000f4447991 [ 700.090067] syz-exec-8760 0...2 287260250us : 0: u00000000f4447991 [ 700.096732] syz-exec-8760 0...2 287260255us : 0: u00000000f4447991 [ 700.103404] syz-exec-8760 0...2 287260259us : 0: u00000000f4447991 [ 700.110061] syz-exec-8760 0...2 287260264us : 0: u00000000f4447991 [ 700.116727] syz-exec-8760 0...2 287260269us : 0: u00000000f4447991 [ 700.123384] syz-exec-8760 0...2 287260274us : 0: u00000000f4447991 [ 700.130062] syz-exec-8760 0...2 287260278us : 0: u00000000f4447991 [ 700.136729] syz-exec-8760 0...2 287260286us : 0: u00000000f4447991 [ 700.143391] syz-exec-8760 0...2 287260292us : 0: u00000000f4447991 [ 700.150049] syz-exec-8760 0...2 287260297us : 0: u00000000f4447991 [ 700.156708] syz-exec-8760 0...2 287260302us : 0: u00000000f4447991 [ 700.163368] syz-exec-8760 0...2 287260307us : 0: u00000000f4447991 [ 700.170029] syz-exec-8760 0...2 287260312us : 0: u00000000f4447991 [ 700.176690] syz-exec-8760 0...2 287260316us : 0: u00000000f4447991 [ 700.183346] syz-exec-8760 0...2 287260321us : 0: u00000000f4447991 [ 700.190007] syz-exec-8760 0...2 287260326us : 0: u00000000f4447991 [ 700.196671] syz-exec-8760 0...2 287260331us : 0: u00000000f4447991 [ 700.203332] syz-exec-8760 0.N.2 287260375us : 0: u00000000f4447991 [ 700.209993] syz-exec-8760 0...2 287261690us : 0: u00000000f4447991 [ 700.216655] syz-exec-8760 0...2 287261696us : 0: u00000000f4447991 [ 700.223333] syz-exec-8760 0...2 287261702us : 0: u00000000f4447991 [ 700.230007] syz-exec-8760 0...2 287261707us : 0: u00000000f4447991 [ 700.236664] syz-exec-8760 0...2 287261713us : 0: u00000000f4447991 [ 700.243322] syz-exec-8760 0...2 287261717us : 0: u00000000f4447991 [ 700.250002] syz-exec-8760 0...2 287261733us : 0: u00000000f4447991 [ 700.256667] syz-exec-8760 0...2 287261740us : 0: u00000000f4447991 [ 700.263328] syz-exec-8760 0...2 287261752us : 0: u00000000f4447991 [ 700.269990] syz-exec-8760 0...2 287261758us : 0: u00000000f4447991 [ 700.276649] syz-exec-8760 0...2 287261764us : 0: u00000000f4447991 [ 700.283307] syz-exec-8760 0...2 287261769us : 0: u00000000f4447991 [ 700.289982] syz-exec-8760 0...2 287261774us : 0: u00000000f4447991 [ 700.296654] syz-exec-8760 0...2 287261780us : 0: u00000000f4447991 [ 700.303310] syz-exec-8760 0...2 287261785us : 0: u00000000f4447991 [ 700.309964] syz-exec-8760 0...2 287261791us : 0: u00000000f4447991 [ 700.316621] syz-exec-8760 0...2 287261795us : 0: u00000000f4447991 [ 700.323281] syz-exec-8760 0...2 287261800us : 0: u00000000f4447991 [ 700.329936] syz-exec-8760 0...2 287261805us : 0: u00000000f4447991 [ 700.336590] syz-exec-8760 0...2 287261810us : 0: u00000000f4447991 [ 700.343253] syz-exec-8760 0...2 287261814us : 0: u00000000f4447991 [ 700.349925] syz-exec-8760 0...2 287261819us : 0: u00000000f4447991 [ 700.356582] syz-exec-8760 0...2 287261824us : 0: u00000000f4447991 [ 700.363254] syz-exec-8760 0...2 287261830us : 0: u00000000f4447991 [ 700.369909] syz-exec-8760 0...2 287261834us : 0: u00000000f4447991 [ 700.376565] syz-exec-8760 0...2 287261840us : 0: u00000000f4447991 [ 700.383230] syz-exec-8760 0...2 287261845us : 0: u00000000f4447991 [ 700.389893] syz-exec-8760 0...2 287261851us : 0: u00000000f4447991 [ 700.396549] syz-exec-8760 0...2 287261855us : 0: u00000000f4447991 [ 700.403203] syz-exec-8760 0...2 287261860us : 0: u00000000f4447991 [ 700.409868] syz-exec-8760 0...2 287261865us : 0: u00000000f4447991 [ 700.416522] syz-exec-8760 0...2 287261870us : 0: u00000000f4447991 [ 700.423176] syz-exec-8760 0...2 287261875us : 0: u00000000f4447991 [ 700.429828] syz-exec-8760 0...2 287261879us : 0: u00000000f4447991 [ 700.436483] syz-exec-8760 0...2 287261884us : 0: u00000000f4447991 [ 700.443137] syz-exec-8760 0...2 287261922us : 0: u00000000f4447991 [ 700.449791] syz-exec-8760 0...2 287261928us : 0: u00000000f4447991 [ 700.456445] syz-exec-8760 0...2 287261933us : 0: u00000000f4447991 [ 700.463109] syz-exec-8760 0...2 287261939us : 0: u00000000f4447991 [ 700.469765] syz-exec-8760 0...2 287261943us : 0: u00000000f4447991 [ 700.476595] syz-exec-8760 0...2 287261949us : 0: u00000000f4447991 [ 700.483255] syz-exec-8760 0...2 287261954us : 0: u00000000f4447991 [ 700.489910] syz-exec-8760 0...2 287261960us : 0: u00000000f4447991 [ 700.496566] syz-exec-8760 0...2 287261964us : 0: u00000000f4447991 [ 700.503230] syz-exec-8760 0...2 287261970us : 0: u00000000f4447991 [ 700.509894] syz-exec-8760 0...2 287261975us : 0: u00000000f4447991 [ 700.516564] syz-exec-8760 0...2 287261980us : 0: u00000000f4447991 [ 700.523233] syz-exec-8760 0...2 287261985us : 0: u00000000f4447991 [ 700.529895] syz-exec-8760 0...2 287261991us : 0: u00000000f4447991 [ 700.536562] syz-exec-8760 0...2 287261995us : 0: u00000000f4447991 [ 700.543225] syz-exec-8760 0...2 287262001us : 0: u00000000f4447991 [ 700.549905] syz-exec-8760 0...2 287262005us : 0: u00000000f4447991 [ 700.556560] syz-exec-8760 0...2 287262011us : 0: u00000000f4447991 [ 700.563225] syz-exec-8760 0...2 287262016us : 0: u00000000f4447991 [ 700.569889] syz-exec-8760 0...2 287262021us : 0: u00000000f4447991 [ 700.576542] syz-exec-8760 0...2 287262026us : 0: u00000000f4447991 [ 700.583217] syz-exec-8760 0...2 287262031us : 0: u00000000f4447991 [ 700.589882] syz-exec-8760 0...2 287262035us : 0: u00000000f4447991 [ 700.596537] syz-exec-8760 0...2 287262040us : 0: u00000000f4447991 [ 700.603207] syz-exec-8760 0...2 287262045us : 0: u00000000f4447991 [ 700.609874] syz-exec-8760 0...2 287262050us : 0: u00000000f4447991 [ 700.616530] syz-exec-8760 0...2 287262054us : 0: u00000000f4447991 [ 700.623207] syz-exec-8760 0...2 287262068us : 0: u00000000f4447991 [ 700.629876] syz-exec-8760 0...2 287262072us : 0: u00000000f4447991 [ 700.636532] syz-exec-8760 0...2 287262077us : 0: u00000000f4447991 [ 700.643189] syz-exec-8760 0...2 287262082us : 0: u00000000f4447991 [ 700.649848] syz-exec-8760 0...2 287262087us : 0: u00000000f4447991 [ 700.656505] syz-exec-8760 0...2 287262092us : 0: u00000000f4447991 [ 700.663159] syz-exec-8760 0...2 287262097us : 0: u00000000f4447991 [ 700.669812] syz-exec-8760 0...2 287262103us : 0: u00000000f4447991 [ 700.676464] syz-exec-8760 0...2 287262107us : 0: u00000000f4447991 [ 700.683123] syz-exec-8760 0...2 287262113us : 0: u00000000f4447991 [ 700.689780] syz-exec-8760 0...2 287262118us : 0: u00000000f4447991 [ 700.696433] syz-exec-8760 0...2 287262122us : 0: u00000000f4447991 [ 700.703097] syz-exec-8760 0...2 287262127us : 0: u00000000f4447991 [ 700.709756] syz-exec-8760 0...2 287262131us : 0: u00000000f4447991 [ 700.716411] syz-exec-8760 0...2 287262136us : 0: u00000000f4447991 [ 700.723064] syz-exec-8760 0...2 287262141us : 0: u00000000f4447991 [ 700.729724] syz-exec-8760 0...2 287262146us : 0: u00000000f4447991 [ 700.736379] syz-exec-8760 0...2 287262151us : 0: u00000000f4447991 [ 700.743033] syz-exec-8760 0...2 287262156us : 0: u00000000f4447991 [ 700.749689] syz-exec-8760 0...2 287262162us : 0: u00000000f4447991 [ 700.756365] syz-exec-8760 0...2 287262167us : 0: u00000000f4447991 [ 700.763021] syz-exec-8760 0...2 287262173us : 0: u00000000f4447991 [ 700.769696] syz-exec-8760 0...2 287262179us : 0: u00000000f4447991 [ 700.776368] syz-exec-8760 0...2 287262185us : 0: u00000000f4447991 [ 700.783031] syz-exec-8760 0...2 287262191us : 0: u00000000f4447991 [ 700.789693] syz-exec-8760 0...2 287262196us : 0: u00000000f4447991 [ 700.796353] syz-exec-8760 0...2 287262201us : 0: u00000000f4447991 [ 700.803029] syz-exec-8760 0...2 287262207us : 0: u00000000f4447991 [ 700.809689] syz-exec-8760 0...2 287262213us : 0: u00000000f4447991 [ 700.816349] syz-exec-8760 0...2 287262220us : 0: u00000000f4447991 [ 700.823004] syz-exec-8760 0...2 287262227us : 0: u00000000f4447991 [ 700.829659] syz-exec-8760 0...2 287262233us : 0: u00000000f4447991 [ 700.836315] syz-exec-8760 0...2 287262239us : 0: u00000000f4447991 [ 700.842971] syz-exec-8760 0...2 287262243us : 0: u00000000f4447991 [ 700.849643] syz-exec-8760 0...2 287262249us : 0: u00000000f4447991 [ 700.856299] syz-exec-8760 0...2 287262255us : 0: u00000000f4447991 [ 700.862952] syz-exec-8760 0...2 287262261us : 0: u00000000f4447991 [ 700.869783] syz-exec-8760 0...2 287262266us : 0: u00000000f4447991 [ 700.876439] syz-exec-8760 0...2 287262271us : 0: u00000000f4447991 [ 700.883107] syz-exec-8760 0...2 287262277us : 0: u00000000f4447991 [ 700.889764] syz-exec-8760 0...2 287262284us : 0: u00000000f4447991 [ 700.896416] syz-exec-8760 0...2 287262291us : 0: u00000000f4447991 [ 700.903072] syz-exec-8760 0...2 287262297us : 0: u00000000f4447991 [ 700.909736] syz-exec-8760 0...2 287262303us : 0: u00000000f4447991 [ 700.916391] syz-exec-8760 0...2 287262309us : 0: u00000000f4447991 [ 700.923044] syz-exec-8760 0...2 287262313us : 0: u00000000f4447991 [ 700.929696] syz-exec-8760 0...2 287262320us : 0: u00000000f4447991 [ 700.936367] syz-exec-8760 0...2 287262325us : 0: u00000000f4447991 [ 700.943022] syz-exec-8760 0...2 287262331us : 0: u00000000f4447991 [ 700.949677] syz-exec-8760 0...2 287262337us : 0: u00000000f4447991 [ 700.956330] syz-exec-8760 0...2 287262343us : 0: u00000000f4447991 [ 700.962984] syz-exec-8760 0...2 287262348us : 0: u00000000f4447991 [ 700.969639] syz-exec-8760 0...2 287262354us : 0: u00000000f4447991 [ 700.976295] syz-exec-8760 0...2 287262360us : 0: u00000000f4447991 [ 700.982948] syz-exec-8760 0...2 287262365us : 0: u00000000f4447991 [ 700.989606] syz-exec-8760 0...2 287262370us : 0: u00000000f4447991 [ 700.996263] syz-exec-8760 0...2 287262376us : 0: u00000000f4447991 [ 701.002916] syz-exec-8760 0...2 287262381us : 0: u00000000f4447991 [ 701.009572] syz-exec-8760 0...2 287262387us : 0: u00000000f4447991 [ 701.016238] syz-exec-8760 0...2 287262394us : 0: u00000000f4447991 [ 701.022897] syz-exec-8760 0...2 287262399us : 0: u00000000f4447991 [ 701.029553] syz-exec-8760 0...2 287262405us : 0: u00000000f4447991 [ 701.036212] syz-exec-8760 0...2 287262409us : 0: u00000000f4447991 [ 701.042879] syz-exec-8760 0...2 287262415us : 0: u00000000f4447991 [ 701.049533] syz-exec-8760 0...2 287262420us : 0: u00000000f4447991 [ 701.056190] syz-exec-8760 0...2 287262426us : 0: u00000000f4447991 [ 701.062848] syz-exec-8760 0...2 287262432us : 0: u00000000f4447991 [ 701.069502] syz-exec-8760 0...2 287262437us : 0: u00000000f4447991 [ 701.076158] syz-exec-8760 0...2 287262443us : 0: u00000000f4447991 [ 701.082814] syz-exec-8760 0...2 287262448us : 0: u00000000f4447991 [ 701.089467] syz-exec-8760 0...2 287262454us : 0: u00000000f4447991 [ 701.096125] syz-exec-8760 0...2 287262460us : 0: u00000000f4447991 [ 701.102783] syz-exec-8760 0...2 287262465us : 0: u00000000f4447991 [ 701.109436] syz-exec-8760 0...2 287262471us : 0: u00000000f4447991 [ 701.116100] syz-exec-8760 0...2 287262476us : 0: u00000000f4447991 [ 701.122761] syz-exec-8760 0...2 287262482us : 0: u00000000f4447991 [ 701.129413] syz-exec-8760 0...2 287262487us : 0: u00000000f4447991 [ 701.136076] syz-exec-8760 0...2 287262493us : 0: u00000000f4447991 [ 701.142759] syz-exec-8760 0...2 287262498us : 0: u00000000f4447991 [ 701.149414] syz-exec-8760 0...2 287262504us : 0: u00000000f4447991 [ 701.156068] syz-exec-8760 0...2 287262509us : 0: u00000000f4447991 [ 701.162729] syz-exec-8760 0...2 287262515us : 0: u00000000f4447991 [ 701.169383] syz-exec-8760 0...2 287262521us : 0: u00000000f4447991 [ 701.176037] syz-exec-8760 0...2 287262526us : 0: u00000000f4447991 [ 701.182691] syz-exec-8760 0...2 287262531us : 0: u00000000f4447991 [ 701.189349] syz-exec-8760 0...2 287262537us : 0: u00000000f4447991 [ 701.196003] syz-exec-8760 0...2 287262542us : 0: u00000000f4447991 [ 701.202659] syz-exec-8760 0...2 287262547us : 0: u00000000f4447991 [ 701.209314] syz-exec-8760 0...2 287262553us : 0: u00000000f4447991 [ 701.215967] syz-exec-8760 0...2 287262557us : 0: u00000000f4447991 [ 701.222623] syz-exec-8760 0...2 287262563us : 0: u00000000f4447991 [ 701.229281] syz-exec-8760 0...2 287262569us : 0: u00000000f4447991 [ 701.235934] syz-exec-8760 0...2 287262575us : 0: u00000000f4447991 [ 701.242588] syz-exec-8760 0...2 287262580us : 0: u00000000f4447991 [ 701.249254] syz-exec-8760 0...2 287262586us : 0: u00000000f4447991 [ 701.255911] syz-exec-8760 0...2 287262591us : 0: u00000000f4447991 [ 701.262577] syz-exec-8760 0...2 287262596us : 0: u00000000f4447991 [ 701.269242] syz-exec-8760 0...2 287262601us : 0: u00000000f4447991 [ 701.275899] syz-exec-8760 0...2 287262607us : 0: u00000000f4447991 [ 701.282564] syz-exec-8760 0...2 287262611us : 0: u00000000f4447991 [ 701.289227] syz-exec-8760 0...2 287262615us : 0: u00000000f4447991 [ 701.295889] syz-exec-8760 0...2 287262620us : 0: u00000000f4447991 [ 701.302542] syz-exec-8760 0...2 287262624us : 0: u00000000f4447991 [ 701.309200] syz-exec-8760 0...2 287262629us : 0: u00000000f4447991 [ 701.315864] syz-exec-8760 0...2 287262634us : 0: u00000000f4447991 [ 701.322518] syz-exec-8760 0...2 287262638us : 0: u00000000f4447991 [ 701.329186] syz-exec-8760 0.N.2 287262644us : 0: u00000000f4447991 [ 701.335843] syz-exec-8760 0...2 287263668us : 0: u00000000f4447991 [ 701.342497] syz-exec-8760 0...2 287263677us : 0: u00000000f4447991 [ 701.349169] syz-exec-8760 0...2 287263684us : 0: u00000000f4447991 [ 701.355828] syz-exec-8760 0...2 287263689us : 0: u00000000f4447991 [ 701.362482] syz-exec-8760 0...2 287263695us : 0: u00000000f4447991 [ 701.369135] syz-exec-8760 0...2 287263700us : 0: u00000000f4447991 [ 701.375819] syz-exec-8760 0...2 287263706us : 0: u00000000f4447991 [ 701.382517] syz-exec-8760 0...2 287263711us : 0: u00000000f4447991 [ 701.389183] syz-exec-8760 0...2 287263717us : 0: u00000000f4447991 [ 701.395853] syz-exec-8760 0...2 287263722us : 0: u00000000f4447991 [ 701.402538] syz-exec-8760 0...2 287263740us : 0: u00000000f4447991 [ 701.409195] syz-exec-8760 0...2 287263753us : 0: u00000000f4447991 [ 701.415855] syz-exec-8760 0...2 287263761us : 0: u00000000f4447991 [ 701.422524] syz-exec-8760 0...2 287263766us : 0: u00000000f4447991 [ 701.429176] syz-exec-8760 0...2 287263772us : 0: u00000000f4447991 [ 701.435830] syz-exec-8760 0...2 287263777us : 0: u00000000f4447991 [ 701.442483] syz-exec-8760 0...2 287263783us : 0: u00000000f4447991 [ 701.449137] syz-exec-8760 0...2 287263788us : 0: u00000000f4447991 [ 701.455790] syz-exec-8760 0...2 287263794us : 0: u00000000f4447991 [ 701.462461] syz-exec-8760 0...2 287263799us : 0: u00000000f4447991 [ 701.469145] syz-exec-8760 0...2 287263805us : 0: u00000000f4447991 [ 701.475830] syz-exec-8760 0...2 287263811us : 0: u00000000f4447991 [ 701.482484] syz-exec-8760 0...2 287263816us : 0: u00000000f4447991 [ 701.489143] syz-exec-8760 0.N.2 287263874us : 0: u00000000f4447991 [ 701.495812] syz-exec-8760 0...2 287264027us : 0: u00000000f4447991 [ 701.502481] syz-exec-8760 0...2 287264034us : 0: u00000000f4447991 [ 701.509148] syz-exec-8760 0...2 287264040us : 0: u00000000f4447991 [ 701.515806] syz-exec-8760 0...2 287264046us : 0: u00000000f4447991 [ 701.522458] syz-exec-8760 0...2 287264051us : 0: u00000000f4447991 [ 701.529130] syz-exec-8760 0...2 287264057us : 0: u00000000f4447991 [ 701.535784] syz-exec-8760 0...2 287264062us : 0: u00000000f4447991 [ 701.542441] syz-exec-8760 0...2 287264068us : 0: u00000000f4447991 [ 701.549106] syz-exec-8760 0...2 287264073us : 0: u00000000f4447991 [ 701.555764] syz-exec-8760 0...2 287264078us : 0: u00000000f4447991 [ 701.562420] syz-exec-8760 0...2 287264084us : 0: u00000000f4447991 [ 701.569073] syz-exec-8760 0...2 287264089us : 0: u00000000f4447991 [ 701.575738] syz-exec-8760 0...2 287264095us : 0: u00000000f4447991 [ 701.582393] syz-exec-8760 0...2 287264100us : 0: u00000000f4447991 [ 701.589047] syz-exec-8760 0...2 287264106us : 0: u00000000f4447991 [ 701.595702] syz-exec-8760 0...2 287264111us : 0: u00000000f4447991 [ 701.602358] syz-exec-8760 0...2 287264117us : 0: u00000000f4447991 [ 701.609014] syz-exec-8760 0...2 287264122us : 0: u00000000f4447991 [ 701.615671] syz-exec-8760 0...2 287264128us : 0: u00000000f4447991 [ 701.622326] syz-exec-8760 0...2 287264133us : 0: u00000000f4447991 [ 701.628981] syz-exec-8760 0...2 287264139us : 0: u00000000f4447991 [ 701.635638] syz-exec-8760 0...2 287264144us : 0: u00000000f4447991 [ 701.642291] syz-exec-8760 0...2 287264148us : 0: u00000000f4447991 [ 701.648944] syz-exec-8760 0...2 287264154us : 0: u00000000f4447991 [ 701.655615] syz-exec-8760 0...2 287264159us : 0: u00000000f4447991 [ 701.662273] syz-exec-8760 0...2 287264164us : 0: u00000000f4447991 [ 701.668928] syz-exec-8760 0...2 287264169us : 0: u00000000f4447991 [ 701.675581] syz-exec-8760 0...2 287264173us : 0: u00000000f4447991 [ 701.682245] syz-exec-8760 0...2 287264178us : 0: u00000000f4447991 [ 701.688904] syz-exec-8760 0...2 287264183us : 0: u00000000f4447991 [ 701.695580] syz-exec-8760 0...2 287264188us : 0: u00000000f4447991 [ 701.702246] syz-exec-8760 0...2 287264193us : 0: u00000000f4447991 [ 701.708901] syz-exec-8760 0...2 287264198us : 0: u00000000f4447991 [ 701.715554] syz-exec-8760 0...2 287264203us : 0: u00000000f4447991 [ 701.722211] syz-exec-8760 0...2 287264208us : 0: u00000000f4447991 [ 701.728876] syz-exec-8760 0...2 287264213us : 0: u00000000f4447991 [ 701.735529] syz-exec-8760 0...2 287264217us : 0: u00000000f4447991 [ 701.742183] syz-exec-8760 0...2 287264222us : 0: u00000000f4447991 [ 701.748839] syz-exec-8760 0...2 287264227us : 0: u00000000f4447991 [ 701.755493] syz-exec-8760 0...2 287264233us : 0: u00000000f4447991 [ 701.762148] syz-exec-8760 0...2 287264238us : 0: u00000000f4447991 [ 701.768803] syz-exec-8760 0...2 287264244us : 0: u00000000f4447991 [ 701.775476] syz-exec-8760 0...2 287264250us : 0: u00000000f4447991 [ 701.782133] syz-exec-8760 0...2 287264259us : 0: u00000000f4447991 [ 701.788803] syz-exec-8760 0...2 287264264us : 0: u00000000f4447991 [ 701.795460] syz-exec-8760 0...2 287264271us : 0: u00000000f4447991 [ 701.802141] syz-exec-8760 0...2 287264276us : 0: u00000000f4447991 [ 701.808797] syz-exec-8760 0...2 287264281us : 0: u00000000f4447991 [ 701.815453] syz-exec-8760 0...2 287264286us : 0: u00000000f4447991 [ 701.822121] syz-exec-8760 0...2 287264292us : 0: u00000000f4447991 [ 701.828777] syz-exec-8760 0...2 287264308us : 0: u00000000f4447991 [ 701.835430] syz-exec-8760 0...2 287264314us : 0: u00000000f4447991 [ 701.842095] syz-exec-8760 0...2 287264319us : 0: u00000000f4447991 [ 701.848759] syz-exec-8760 0...2 287264324us : 0: u00000000f4447991 [ 701.855435] syz-exec-8760 0...2 287264329us : 0: u00000000f4447991 [ 701.862107] syz-exec-8760 0...2 287264342us : 0: u00000000f4447991 [ 701.868762] syz-exec-8760 0...2 287264347us : 0: u00000000f4447991 [ 701.875415] syz-exec-8760 0...2 287264352us : 0: u00000000f4447991 [ 701.882069] syz-exec-8760 0...2 287264357us : 0: u00000000f4447991 [ 701.888729] syz-exec-8760 0...2 287264362us : 0: u00000000f4447991 [ 701.895382] syz-exec-8760 0...2 287264367us : 0: u00000000f4447991 [ 701.902036] syz-exec-8760 0...2 287264384us : 0: u00000000f4447991 [ 701.908689] syz-exec-8760 0...2 287264390us : 0: u00000000f4447991 [ 701.915362] syz-exec-8760 0...2 287264396us : 0: u00000000f4447991 [ 701.922017] syz-exec-8760 0...2 287264401us : 0: u00000000f4447991 [ 701.928673] syz-exec-8760 0...2 287264407us : 0: u00000000f4447991 [ 701.935327] syz-exec-8760 0...2 287264412us : 0: u00000000f4447991 [ 701.941981] syz-exec-8760 0...2 287264417us : 0: u00000000f4447991 [ 701.948651] syz-exec-8760 0...2 287264423us : 0: u00000000f4447991 [ 701.955308] syz-exec-8760 0...2 287264428us : 0: u00000000f4447991 [ 701.961961] syz-exec-8760 0...2 287264434us : 0: u00000000f4447991 [ 701.968632] syz-exec-8760 0...2 287264439us : 0: u00000000f4447991 [ 701.975307] syz-exec-8760 0...2 287264444us : 0: u00000000f4447991 [ 701.981962] syz-exec-8760 0...2 287264449us : 0: u00000000f4447991 [ 701.988620] syz-exec-8760 0...2 287264455us : 0: u00000000f4447991 [ 701.995277] syz-exec-8760 0...2 287264460us : 0: u00000000f4447991 [ 702.001960] syz-exec-8760 0...2 287264465us : 0: u00000000f4447991 [ 702.008617] syz-exec-8760 0...2 287264469us : 0: u00000000f4447991 [ 702.015284] syz-exec-8760 0...2 287264475us : 0: u00000000f4447991 [ 702.021939] syz-exec-8760 0...2 287264480us : 0: u00000000f4447991 [ 702.028596] syz-exec-8760 0...2 287264485us : 0: u00000000f4447991 [ 702.035256] syz-exec-8760 0...2 287264490us : 0: u00000000f4447991 [ 702.041920] syz-exec-8760 0...2 287264496us : 0: u00000000f4447991 [ 702.048575] syz-exec-8760 0...2 287264501us : 0: u00000000f4447991 [ 702.055242] syz-exec-8760 0...2 287264507us : 0: u00000000f4447991 [ 702.061902] syz-exec-8760 0...2 287264512us : 0: u00000000f4447991 [ 702.068557] syz-exec-8760 0...2 287264518us : 0: u00000000f4447991 [ 702.075218] syz-exec-8760 0...2 287264523us : 0: u00000000f4447991 [ 702.081882] syz-exec-8760 0...2 287264529us : 0: u00000000f4447991 [ 702.088538] syz-exec-8760 0...2 287264535us : 0: u00000000f4447991 [ 702.095192] syz-exec-8760 0...2 287264541us : 0: u00000000f4447991 [ 702.101852] syz-exec-8760 0...2 287264547us : 0: u00000000f4447991 [ 702.108525] syz-exec-8760 0...2 287264553us : 0: u00000000f4447991 [ 702.115181] syz-exec-8760 0...2 287264559us : 0: u00000000f4447991 [ 702.121837] syz-exec-8760 0...2 287264565us : 0: u00000000f4447991 [ 702.128493] syz-exec-8760 0...2 287264570us : 0: u00000000f4447991 [ 702.135150] syz-exec-8760 0...2 287264576us : 0: u00000000f4447991 [ 702.141806] syz-exec-8760 0...2 287264581us : 0: u00000000f4447991 [ 702.148461] syz-exec-8760 0...2 287264586us : 0: u00000000f4447991 [ 702.155118] syz-exec-8760 0...2 287264591us : 0: u00000000f4447991 [ 702.161774] syz-exec-8760 0...2 287264596us : 0: u00000000f4447991 [ 702.168428] syz-exec-8760 0...2 287264601us : 0: u00000000f4447991 [ 702.175093] syz-exec-8760 0...2 287264607us : 0: u00000000f4447991 [ 702.181752] syz-exec-8760 0...2 287264613us : 0: u00000000f4447991 [ 702.188408] syz-exec-8760 0...2 287264617us : 0: u00000000f4447991 [ 702.195063] syz-exec-8760 0...2 287264623us : 0: u00000000f4447991 [ 702.201726] syz-exec-8760 0...2 287264628us : 0: u00000000f4447991 [ 702.208383] syz-exec-8760 0...2 287264634us : 0: u00000000f4447991 [ 702.215039] syz-exec-8760 0...2 287264639us : 0: u00000000f4447991 [ 702.221695] syz-exec-8760 0...2 287264645us : 0: u00000000f4447991 [ 702.228349] syz-exec-8760 0...2 287264650us : 0: u00000000f4447991 [ 702.235004] syz-exec-8760 0...2 287264655us : 0: u00000000f4447991 [ 702.241688] syz-exec-8760 0...2 287264660us : 0: u00000000f4447991 [ 702.248346] syz-exec-8760 0...2 287264667us : 0: u00000000f4447991 [ 702.255017] syz-exec-8760 0...2 287264672us : 0: u00000000f4447991 [ 702.261676] syz-exec-8760 0...2 287264677us : 0: u00000000f4447991 [ 702.268331] syz-exec-8760 0...2 287264682us : 0: u00000000f4447991 [ 702.274987] syz-exec-8760 0...2 287264688us : 0: u00000000f4447991 [ 702.281641] syz-exec-8760 0...2 287264693us : 0: u00000000f4447991 [ 702.288302] syz-exec-8760 0...2 287264699us : 0: u00000000f4447991 [ 702.294960] syz-exec-8760 0...2 287264828us : 0: u00000000f4447991 [ 702.301622] syz-exec-8760 0...2 287264835us : 0: u00000000f4447991 [ 702.308281] syz-exec-8760 0...2 287264840us : 0: u00000000f4447991 [ 702.314943] syz-exec-8760 0...2 287264845us : 0: u00000000f4447991 [ 702.321601] syz-exec-8760 0...2 287264852us : 0: u00000000f4447991 [ 702.328269] syz-exec-8760 0...2 287264857us : 0: u00000000f4447991 [ 702.334931] syz-exec-8760 0...2 287264862us : 0: u00000000f4447991 [ 702.341591] syz-exec-8760 0...2 287264867us : 0: u00000000f4447991 [ 702.348259] syz-exec-8760 0...2 287264873us : 0: u00000000f4447991 [ 702.354917] syz-exec-8760 0...2 287264878us : 0: u00000000f4447991 [ 702.361573] syz-exec-8760 0...2 287264882us : 0: u00000000f4447991 [ 702.368241] syz-exec-8760 0...2 287264927us : 0: u00000000f4447991 [ 702.374899] syz-exec-8760 0...2 287264935us : 0: u00000000f4447991 [ 702.381553] syz-exec-8760 0...2 287264941us : 0: u00000000f4447991 [ 702.388216] syz-exec-8760 0...2 287264947us : 0: u00000000f4447991 [ 702.394880] syz-exec-8760 0...2 287264951us : 0: u00000000f4447991 [ 702.401536] syz-exec-8760 0...2 287264956us : 0: u00000000f4447991 [ 702.408188] syz-exec-8760 0...2 287264962us : 0: u00000000f4447991 [ 702.414845] syz-exec-8760 0...2 287264966us : 0: u00000000f4447991 [ 702.421499] syz-exec-8760 0...2 287264972us : 0: u00000000f4447991 [ 702.428153] syz-exec-8760 0...2 287264976us : 0: u00000000f4447991 [ 702.434806] syz-exec-8760 0...2 287264982us : 0: u00000000f4447991 [ 702.441459] syz-exec-8760 0...2 287264987us : 0: u00000000f4447991 [ 702.448134] syz-exec-8760 0...2 287264992us : 0: u00000000f4447991 [ 702.454790] syz-exec-8760 0...2 287264996us : 0: u00000000f4447991 [ 702.461443] syz-exec-8760 0...2 287265003us : 0: u00000000f4447991 [ 702.468109] syz-exec-8760 0.N.2 287265057us : 0: u00000000f4447991 [ 702.474764] syz-exec-8760 0...2 287290613us : 0: u00000000f4447991 [ 702.481418] syz-exec-8760 0...2 287290621us : 0: u00000000f4447991 [ 702.488072] syz-exec-8760 0...2 287290628us : 0: u00000000f4447991 [ 702.494737] syz-exec-8760 0...2 287290633us : 0: u00000000f4447991 [ 702.501392] syz-exec-8760 0...2 287290639us : 0: u00000000f4447991 [ 702.508044] syz-exec-8760 0...2 287290644us : 0: u00000000f4447991 [ 702.514698] syz-exec-8760 0...2 287290651us : 0: u00000000f4447991 [ 702.521353] syz-exec-8760 0...2 287290657us : 0: u00000000f4447991 [ 702.528021] syz-exec-8760 0...2 287290662us : 0: u00000000f4447991 [ 702.534678] syz-exec-8760 0...2 287290668us : 0: u00000000f4447991 [ 702.541333] syz-exec-8760 0...2 287290673us : 0: u00000000f4447991 [ 702.547988] syz-exec-8760 0...2 287290679us : 0: u00000000f4447991 [ 702.554649] syz-exec-8760 0...2 287290684us : 0: u00000000f4447991 [ 702.561322] syz-exec-8760 0...2 287290688us : 0: u00000000f4447991 [ 702.567994] syz-exec-8760 0...2 287290693us : 0: u00000000f4447991 [ 702.574652] syz-exec-8760 0...2 287290698us : 0: u00000000f4447991 [ 702.581317] syz-exec-8760 0...2 287290703us : 0: u00000000f4447991 [ 702.587971] syz-exec-8760 0...2 287290708us : 0: u00000000f4447991 [ 702.594627] syz-exec-8760 0...2 287290713us : 0: u00000000f4447991 [ 702.601283] syz-exec-8760 0...2 287290718us : 0: u00000000f4447991 [ 702.607937] syz-exec-8760 0...2 287290737us : 0: u00000000f4447991 [ 702.614594] syz-exec-8760 0...2 287290743us : 0: u00000000f4447991 [ 702.621253] syz-exec-8760 0...2 287290758us : 0: u00000000f4447991 [ 702.627910] syz-exec-8760 0...2 287290764us : 0: u00000000f4447991 [ 702.634565] syz-exec-8760 0...2 287290768us : 0: u00000000f4447991 [ 702.641228] syz-exec-8760 0...2 287290774us : 0: u00000000f4447991 [ 702.647905] syz-exec-8760 0...2 287290779us : 0: u00000000f4447991 [ 702.654569] syz-exec-8760 0...2 287290786us : 0: u00000000f4447991 [ 702.661234] syz-exec-8760 0...2 287290791us : 0: u00000000f4447991 [ 702.667892] syz-exec-8760 0...2 287290796us : 0: u00000000f4447991 [ 702.674548] syz-exec-8760 0...2 287290802us : 0: u00000000f4447991 [ 702.681202] syz-exec-8760 0...2 287290808us : 0: u00000000f4447991 [ 702.687868] syz-exec-8760 0...2 287290813us : 0: u00000000f4447991 [ 702.694523] syz-exec-8760 0...2 287290819us : 0: u00000000f4447991 [ 702.701178] syz-exec-8760 0...2 287290824us : 0: u00000000f4447991 [ 702.707832] syz-exec-8760 0...2 287290829us : 0: u00000000f4447991 [ 702.714491] syz-exec-8760 0...2 287290834us : 0: u00000000f4447991 [ 702.721169] syz-exec-8760 0...2 287290839us : 0: u00000000f4447991 [ 702.727826] syz-exec-8760 0...2 287290844us : 0: u00000000f4447991 [ 702.734480] syz-exec-8760 0...2 287290849us : 0: u00000000f4447991 [ 702.741137] syz-exec-8760 0...2 287290854us : 0: u00000000f4447991 [ 702.747793] syz-exec-8760 0...2 287290859us : 0: u00000000f4447991 [ 702.754448] syz-exec-8760 0...2 287290864us : 0: u00000000f4447991 [ 702.761114] syz-exec-8760 0...2 287290868us : 0: u00000000f4447991 [ 702.767787] syz-exec-8760 0...2 287290873us : 0: u00000000f4447991 [ 702.774442] syz-exec-8760 0...2 287290878us : 0: u00000000f4447991 [ 702.781109] syz-exec-8760 0...2 287290883us : 0: u00000000f4447991 [ 702.787764] syz-exec-8760 0.N.2 287290968us : 0: u00000000f4447991 [ 702.794421] syz-exec-8760 0...2 287299679us : 0: u00000000f4447991 [ 702.801119] syz-exec-8760 0...2 287299688us : 0: u00000000f4447991 [ 702.807782] syz-exec-8760 0...2 287299693us : 0: u00000000f4447991 [ 702.814438] syz-exec-8760 0...2 287299710us : 0: u00000000f4447991 [ 702.821099] syz-exec-8760 0...2 287299715us : 0: u00000000f4447991 [ 702.827774] syz-exec-8760 0...2 287299720us : 0: u00000000f4447991 [ 702.834434] syz-exec-8760 0...2 287299738us : 0: u00000000f4447991 [ 702.841097] syz-exec-8760 0...2 287299744us : 0: u00000000f4447991 [ 702.847772] syz-exec-8760 0...2 287299763us : 0: u00000000f4447991 [ 702.854430] syz-exec-8760 0...2 287299771us : 0: u00000000f4447991 [ 702.861093] syz-exec-8760 0...2 287299777us : 0: u00000000f4447991 [ 702.867754] syz-exec-8760 0...2 287299783us : 0: u00000000f4447991 [ 702.874408] syz-exec-8760 0...2 287299788us : 0: u00000000f4447991 [ 702.881290] syz-exec-8760 0...2 287299794us : 0: u00000000f4447991 [ 702.887959] syz-exec-8760 0...2 287299799us : 0: u00000000f4447991 [ 702.894615] syz-exec-8760 0...2 287299805us : 0: u00000000f4447991 [ 702.901270] syz-exec-8760 0...2 287299810us : 0: u00000000f4447991 [ 702.907927] syz-exec-8760 0...2 287299815us : 0: u00000000f4447991 [ 702.914584] syz-exec-8760 0...2 287299820us : 0: u00000000f4447991 [ 702.921248] syz-exec-8760 0...2 287299825us : 0: u00000000f4447991 [ 702.927907] syz-exec-8760 0...2 287299829us : 0: u00000000f4447991 [ 702.934562] syz-exec-8760 0...2 287299834us : 0: u00000000f4447991 [ 702.941226] syz-exec-8760 0...2 287299839us : 0: u00000000f4447991 [ 702.947892] syz-exec-8760 0...2 287299844us : 0: u00000000f4447991 [ 702.954549] syz-exec-8760 0...2 287299849us : 0: u00000000f4447991 [ 702.961207] syz-exec-8760 0...2 287299854us : 0: u00000000f4447991 [ 702.967960] syz-exec-8760 0...2 287299859us : 0: u00000000f4447991 [ 702.974616] syz-exec-8760 0...2 287299864us : 0: u00000000f4447991 [ 702.981278] syz-exec-8760 0...2 287299868us : 0: u00000000f4447991 [ 702.987937] syz-exec-8760 0...2 287299873us : 0: u00000000f4447991 [ 702.994596] syz-exec-8760 0...2 287299878us : 0: u00000000f4447991 [ 703.001263] syz-exec-8760 0...2 287299883us : 0: u00000000f4447991 [ 703.007920] syz-exec-8760 0...2 287299942us : 0: u00000000f4447991 [ 703.014577] syz-exec-8760 0...2 287299949us : 0: u00000000f4447991 [ 703.021242] syz-exec-8760 0...2 287299955us : 0: u00000000f4447991 [ 703.027918] syz-exec-8760 0...2 287299960us : 0: u00000000f4447991 [ 703.034576] syz-exec-8760 0...2 287299965us : 0: u00000000f4447991 [ 703.041243] syz-exec-8760 0...2 287299970us : 0: u00000000f4447991 [ 703.047903] syz-exec-8760 0...2 287299976us : 0: u00000000f4447991 [ 703.054559] syz-exec-8760 0...2 287299981us : 0: u00000000f4447991 [ 703.061224] syz-exec-8760 0...2 287299987us : 0: u00000000f4447991 [ 703.067888] syz-exec-8760 0...2 287299992us : 0: u00000000f4447991 [ 703.074559] syz-exec-8760 0...2 287299997us : 0: u00000000f4447991 [ 703.081221] syz-exec-8760 0...2 287300002us : 0: u00000000f4447991 [ 703.087884] syz-exec-8760 0...2 287300007us : 0: u00000000f4447991 [ 703.094537] syz-exec-8760 0...2 287300012us : 0: u00000000f4447991 [ 703.101193] syz-exec-8760 0...2 287300017us : 0: u00000000f4447991 [ 703.107869] syz-exec-8760 0...2 287300022us : 0: u00000000f4447991 [ 703.114526] syz-exec-8760 0...2 287300027us : 0: u00000000f4447991 [ 703.121182] syz-exec-8760 0...2 287300040us : 0: u00000000f4447991 [ 703.127837] syz-exec-8760 0...2 287300045us : 0: u00000000f4447991 [ 703.134494] syz-exec-8760 0...2 287300050us : 0: u00000000f4447991 [ 703.141149] syz-exec-8760 0...2 287300055us : 0: u00000000f4447991 [ 703.147805] syz-exec-8760 0...2 287300060us : 0: u00000000f4447991 [ 703.154461] syz-exec-8760 0...2 287300065us : 0: u00000000f4447991 [ 703.161122] syz-exec-8760 0...2 287300070us : 0: u00000000f4447991 [ 703.167781] syz-exec-8760 0...2 287300075us : 0: u00000000f4447991 [ 703.174436] syz-exec-8760 0...2 287300080us : 0: u00000000f4447991 [ 703.181097] syz-exec-8760 0...2 287300085us : 0: u00000000f4447991 [ 703.187757] syz-exec-8760 0...2 287300090us : 0: u00000000f4447991 [ 703.194410] syz-exec-8760 0...2 287300095us : 0: u00000000f4447991 [ 703.201068] syz-exec-8760 0...2 287300100us : 0: u00000000f4447991 [ 703.207735] syz-exec-8760 0...2 287300104us : 0: u00000000f4447991 [ 703.214391] syz-exec-8760 0...2 287300109us : 0: u00000000f4447991 [ 703.221045] syz-exec-8760 0...2 287300114us : 0: u00000000f4447991 [ 703.227701] syz-exec-8760 0...2 287300119us : 0: u00000000f4447991 [ 703.234355] syz-exec-8760 0...2 287300124us : 0: u00000000f4447991 [ 703.241026] syz-exec-8760 0...2 287300128us : 0: u00000000f4447991 [ 703.247679] syz-exec-8760 0...2 287300133us : 0: u00000000f4447991 [ 703.254336] syz-exec-8760 0...2 287300139us : 0: u00000000f4447991 [ 703.260988] syz-exec-8760 0...2 287300144us : 0: u00000000f4447991 [ 703.267657] syz-exec-8760 0...2 287300150us : 0: u00000000f4447991 [ 703.274327] syz-exec-8760 0...2 287300155us : 0: u00000000f4447991 [ 703.280984] syz-exec-8760 0...2 287300161us : 0: u00000000f4447991 [ 703.287636] syz-exec-8760 0...2 287300166us : 0: u00000000f4447991 [ 703.294293] syz-exec-8760 0...2 287300171us : 0: u00000000f4447991 [ 703.300947] syz-exec-8760 0...2 287300177us : 0: u00000000f4447991 [ 703.307602] syz-exec-8760 0...2 287300182us : 0: u00000000f4447991 [ 703.314261] syz-exec-8760 0...2 287300187us : 0: u00000000f4447991 [ 703.320917] syz-exec-8760 0...2 287300193us : 0: u00000000f4447991 [ 703.327574] syz-exec-8760 0...2 287300198us : 0: u00000000f4447991 [ 703.334245] syz-exec-8760 0...2 287300204us : 0: u00000000f4447991 [ 703.340908] syz-exec-8760 0...2 287300208us : 0: u00000000f4447991 [ 703.347591] syz-exec-8760 0...2 287300213us : 0: u00000000f4447991 [ 703.354253] syz-exec-8760 0...2 287300218us : 0: u00000000f4447991 [ 703.360934] syz-exec-8760 0...2 287300223us : 0: u00000000f4447991 [ 703.367607] syz-exec-8760 0...2 287300228us : 0: u00000000f4447991 [ 703.374267] syz-exec-8760 0...2 287300232us : 0: u00000000f4447991 [ 703.380922] syz-exec-8760 0...2 287300237us : 0: u00000000f4447991 [ 703.387574] syz-exec-8760 0...2 287300242us : 0: u00000000f4447991 [ 703.394239] syz-exec-8760 0...2 287300247us : 0: u00000000f4447991 [ 703.400900] syz-exec-8760 0...2 287300254us : 0: u00000000f4447991 [ 703.407566] syz-exec-8760 0...2 287300261us : 0: u00000000f4447991 [ 703.414235] syz-exec-8760 0...2 287300266us : 0: u00000000f4447991 [ 703.420896] syz-exec-8760 0...2 287300271us : 0: u00000000f4447991 [ 703.427551] syz-exec-8760 0...2 287300276us : 0: u00000000f4447991 [ 703.434207] syz-exec-8760 0...2 287300282us : 0: u00000000f4447991 [ 703.440875] syz-exec-8760 0...2 287300287us : 0: u00000000f4447991 [ 703.447531] syz-exec-8760 0...2 287300293us : 0: u00000000f4447991 [ 703.454188] syz-exec-8760 0...2 287300298us : 0: u00000000f4447991 [ 703.460847] syz-exec-8760 0...2 287300304us : 0: u00000000f4447991 [ 703.467500] syz-exec-8760 0...2 287300308us : 0: u00000000f4447991 [ 703.474163] syz-exec-8760 0...2 287300314us : 0: u00000000f4447991 [ 703.480820] syz-exec-8760 0.N.2 287300355us : 0: u00000000f4447991 [ 703.487503] syz-exec-8760 0...2 287301594us : 0: u00000000f4447991 [ 703.494158] syz-exec-8760 0...2 287301602us : 0: u00000000f4447991 [ 703.500810] syz-exec-8760 0...2 287301610us : 0: u00000000f4447991 [ 703.507465] syz-exec-8760 0...2 287301617us : 0: u00000000f4447991 [ 703.514121] syz-exec-8760 0...2 287301624us : 0: u00000000f4447991 [ 703.520776] syz-exec-8760 0...2 287301631us : 0: u00000000f4447991 [ 703.527428] syz-exec-8760 0...2 287301639us : 0: u00000000f4447991 [ 703.534093] syz-exec-8760 0...2 287301647us : 0: u00000000f4447991 [ 703.540750] syz-exec-8760 0...2 287301655us : 0: u00000000f4447991 [ 703.547404] syz-exec-8760 0...2 287301662us : 0: u00000000f4447991 [ 703.554058] syz-exec-8760 0...2 287301669us : 0: u00000000f4447991 [ 703.560718] syz-exec-8760 0...2 287301677us : 0: u00000000f4447991 [ 703.567377] syz-exec-8760 0...2 287301684us : 0: u00000000f4447991 [ 703.574031] syz-exec-8760 0...2 287301691us : 0: u00000000f4447991 [ 703.580685] syz-exec-8760 0...2 287301698us : 0: u00000000f4447991 [ 703.587337] syz-exec-8760 0...2 287301706us : 0: u00000000f4447991 [ 703.593989] syz-exec-8760 0...2 287301713us : 0: u00000000f4447991 [ 703.600642] syz-exec-8760 0...2 287301720us : 0: u00000000f4447991 [ 703.607298] syz-exec-8760 0...2 287301740us : 0: u00000000f4447991 [ 703.613953] syz-exec-8760 0...2 287301754us : 0: u00000000f4447991 [ 703.620612] syz-exec-8760 0...2 287301763us : 0: u00000000f4447991 [ 703.627267] syz-exec-8760 0...2 287301769us : 0: u00000000f4447991 [ 703.633920] syz-exec-8760 0...2 287301774us : 0: u00000000f4447991 [ 703.640573] syz-exec-8760 0...2 287301780us : 0: u00000000f4447991 [ 703.647240] syz-exec-8760 0...2 287301786us : 0: u00000000f4447991 [ 703.653898] syz-exec-8760 0...2 287301791us : 0: u00000000f4447991 [ 703.660552] syz-exec-8760 0...2 287301797us : 0: u00000000f4447991 [ 703.667207] syz-exec-8760 0...2 287301802us : 0: u00000000f4447991 [ 703.673874] syz-exec-8760 0...2 287301808us : 0: u00000000f4447991 [ 703.680531] syz-exec-8760 0...2 287301813us : 0: u00000000f4447991 [ 703.687198] syz-exec-8760 0...2 287301819us : 0: u00000000f4447991 [ 703.693890] syz-exec-8760 0...2 287301824us : 0: u00000000f4447991 [ 703.700549] syz-exec-8760 0...2 287301829us : 0: u00000000f4447991 [ 703.707211] syz-exec-8760 0...2 287301836us : 0: u00000000f4447991 [ 703.713880] syz-exec-8760 0...2 287301843us : 0: u00000000f4447991 [ 703.720538] syz-exec-8760 0...2 287301850us : 0: u00000000f4447991 [ 703.727194] syz-exec-8760 0...2 287301857us : 0: u00000000f4447991 [ 703.733858] syz-exec-8760 0...2 287301865us : 0: u00000000f4447991 [ 703.740515] syz-exec-8760 0...2 287301872us : 0: u00000000f4447991 [ 703.747172] syz-exec-8760 0...2 287301879us : 0: u00000000f4447991 [ 703.753827] syz-exec-8760 0...2 287301920us : 0: u00000000f4447991 [ 703.760505] syz-exec-8760 0...2 287301929us : 0: u00000000f4447991 [ 703.767163] syz-exec-8760 0...2 287301936us : 0: u00000000f4447991 [ 703.773819] syz-exec-8760 0...2 287301944us : 0: u00000000f4447991 [ 703.780474] syz-exec-8760 0...2 287301951us : 0: u00000000f4447991 [ 703.787135] syz-exec-8760 0...2 287301958us : 0: u00000000f4447991 [ 703.793791] syz-exec-8760 0...2 287301965us : 0: u00000000f4447991 [ 703.800448] syz-exec-8760 0...2 287301973us : 0: u00000000f4447991 [ 703.807114] syz-exec-8760 0...2 287301980us : 0: u00000000f4447991 [ 703.813770] syz-exec-8760 0...2 287301987us : 0: u00000000f4447991 [ 703.820424] syz-exec-8760 0...2 287301994us : 0: u00000000f4447991 [ 703.827090] syz-exec-8760 0...2 287302002us : 0: u00000000f4447991 [ 703.833750] syz-exec-8760 0...2 287302009us : 0: u00000000f4447991 [ 703.840405] syz-exec-8760 0...2 287302016us : 0: u00000000f4447991 [ 703.847063] syz-exec-8760 0...2 287302024us : 0: u00000000f4447991 [ 703.853730] syz-exec-8760 0...2 287302031us : 0: u00000000f4447991 [ 703.860392] syz-exec-8760 0...2 287302038us : 0: u00000000f4447991 [ 703.867051] syz-exec-8760 0...2 287302046us : 0: u00000000f4447991 [ 703.873707] syz-exec-8760 0...2 287302053us : 0: u00000000f4447991 [ 703.880365] syz-exec-8760 0...2 287302060us : 0: u00000000f4447991 [ 703.887023] syz-exec-8760 0...2 287302068us : 0: u00000000f4447991 [ 703.893692] syz-exec-8760 0...2 287302075us : 0: u00000000f4447991 [ 703.900348] syz-exec-8760 0...2 287302083us : 0: u00000000f4447991 [ 703.907005] syz-exec-8760 0...2 287302090us : 0: u00000000f4447991 [ 703.913661] syz-exec-8760 0...2 287302097us : 0: u00000000f4447991 [ 703.920334] syz-exec-8760 0...2 287302104us : 0: u00000000f4447991 [ 703.927012] syz-exec-8760 0...2 287302112us : 0: u00000000f4447991 [ 703.933671] syz-exec-8760 0...2 287302119us : 0: u00000000f4447991 [ 703.940329] syz-exec-8760 0...2 287302126us : 0: u00000000f4447991 [ 703.946984] syz-exec-8760 0...2 287302134us : 0: u00000000f4447991 [ 703.953640] syz-exec-8760 0...2 287302141us : 0: u00000000f4447991 [ 703.960299] syz-exec-8760 0...2 287302148us : 0: u00000000f4447991 [ 703.966955] syz-exec-8760 0...2 287302156us : 0: u00000000f4447991 [ 703.973626] syz-exec-8760 0...2 287302163us : 0: u00000000f4447991 [ 703.980285] syz-exec-8760 0...2 287302171us : 0: u00000000f4447991 [ 703.986941] syz-exec-8760 0...2 287302178us : 0: u00000000f4447991 [ 703.993596] syz-exec-8760 0...2 287302185us : 0: u00000000f4447991 [ 704.000258] syz-exec-8760 0...2 287302192us : 0: u00000000f4447991 [ 704.006916] syz-exec-8760 0...2 287302199us : 0: u00000000f4447991 [ 704.013573] syz-exec-8760 0...2 287302206us : 0: u00000000f4447991 [ 704.020256] syz-exec-8760 0...2 287302214us : 0: u00000000f4447991 [ 704.026915] syz-exec-8760 0...2 287302221us : 0: u00000000f4447991 [ 704.033571] syz-exec-8760 0...2 287302228us : 0: u00000000f4447991 [ 704.040239] syz-exec-8760 0...2 287302236us : 0: u00000000f4447991 [ 704.046905] syz-exec-8760 0...2 287302243us : 0: u00000000f4447991 [ 704.053576] syz-exec-8760 0...2 287302250us : 0: u00000000f4447991 [ 704.060245] syz-exec-8760 0...2 287302259us : 0: u00000000f4447991 [ 704.066912] syz-exec-8760 0...2 287302266us : 0: u00000000f4447991 [ 704.073566] syz-exec-8760 0...2 287302273us : 0: u00000000f4447991 [ 704.080239] syz-exec-8760 0...2 287302280us : 0: u00000000f4447991 [ 704.086899] syz-exec-8760 0...2 287302288us : 0: u00000000f4447991 [ 704.093554] syz-exec-8760 0...2 287302295us : 0: u00000000f4447991 [ 704.100213] syz-exec-8760 0...2 287302302us : 0: u00000000f4447991 [ 704.106880] syz-exec-8760 0...2 287302309us : 0: u00000000f4447991 [ 704.113537] syz-exec-8760 0...2 287302316us : 0: u00000000f4447991 [ 704.120194] syz-exec-8760 0...2 287302324us : 0: u00000000f4447991 [ 704.126861] syz-exec-8760 0...2 287302331us : 0: u00000000f4447991 [ 704.133521] syz-exec-8760 0...2 287302338us : 0: u00000000f4447991 [ 704.140174] syz-exec-8760 0...2 287302345us : 0: u00000000f4447991 [ 704.146830] syz-exec-8760 0...2 287302353us : 0: u00000000f4447991 [ 704.153483] syz-exec-8760 0...2 287302360us : 0: u00000000f4447991 [ 704.160136] syz-exec-8760 0...2 287302366us : 0: u00000000f4447991 [ 704.166793] syz-exec-8760 0...2 287302372us : 0: u00000000f4447991 [ 704.173447] syz-exec-8760 0...2 287302379us : 0: u00000000f4447991 [ 704.180108] syz-exec-8760 0...2 287302384us : 0: u00000000f4447991 [ 704.186779] syz-exec-8760 0...2 287302390us : 0: u00000000f4447991 [ 704.193433] syz-exec-8760 0...2 287302396us : 0: u00000000f4447991 [ 704.200094] syz-exec-8760 0...2 287302402us : 0: u00000000f4447991 [ 704.206753] syz-exec-8760 0...2 287302408us : 0: u00000000f4447991 [ 704.213407] syz-exec-8760 0...2 287302414us : 0: u00000000f4447991 [ 704.220063] syz-exec-8760 0...2 287302420us : 0: u00000000f4447991 [ 704.226740] syz-exec-8760 0...2 287302426us : 0: u00000000f4447991 [ 704.233394] syz-exec-8760 0...2 287302431us : 0: u00000000f4447991 [ 704.240046] syz-exec-8760 0...2 287302437us : 0: u00000000f4447991 [ 704.246698] syz-exec-8760 0...2 287302442us : 0: u00000000f4447991 [ 704.253355] syz-exec-8760 0...2 287302448us : 0: u00000000f4447991 [ 704.260009] syz-exec-8760 0...2 287302453us : 0: u00000000f4447991 [ 704.266676] syz-exec-8760 0...2 287302458us : 0: u00000000f4447991 [ 704.273329] syz-exec-8760 0...2 287302463us : 0: u00000000f4447991 [ 704.279984] syz-exec-8760 0...2 287302468us : 0: u00000000f4447991 [ 704.286637] syz-exec-8760 0...2 287302473us : 0: u00000000f4447991 [ 704.293291] syz-exec-8760 0...2 287302479us : 0: u00000000f4447991 [ 704.299943] syz-exec-8760 0...2 287302484us : 0: u00000000f4447991 [ 704.306625] syz-exec-8760 0...2 287302490us : 0: u00000000f4447991 [ 704.313282] syz-exec-8760 0...2 287302495us : 0: u00000000f4447991 [ 704.319936] syz-exec-8760 0...2 287302501us : 0: u00000000f4447991 [ 704.326588] syz-exec-8760 0...2 287302506us : 0: u00000000f4447991 [ 704.333250] syz-exec-8760 0...2 287302512us : 0: u00000000f4447991 [ 704.339921] syz-exec-8760 0...2 287302517us : 0: u00000000f4447991 [ 704.346575] syz-exec-8760 0...2 287302522us : 0: u00000000f4447991 [ 704.353243] syz-exec-8760 0...2 287302527us : 0: u00000000f4447991 [ 704.359900] syz-exec-8760 0...2 287302533us : 0: u00000000f4447991 [ 704.366556] syz-exec-8760 0...2 287302539us : 0: u00000000f4447991 [ 704.373219] syz-exec-8760 0...2 287302545us : 0: u00000000f4447991 [ 704.379883] syz-exec-8760 0...2 287302551us : 0: u00000000f4447991 [ 704.386535] syz-exec-8760 0...2 287302556us : 0: u00000000f4447991 [ 704.393217] syz-exec-8760 0...2 287302562us : 0: u00000000f4447991 [ 704.399879] syz-exec-8760 0...2 287302567us : 0: u00000000f4447991 [ 704.406536] syz-exec-8760 0.N.2 287302623us : 0: u00000000f4447991 [ 704.413192] syz-exec-8760 0...2 287308820us : 0: u00000000f4447991 [ 704.419851] syz-exec-8760 0...2 287308828us : 0: u00000000f4447991 [ 704.426506] syz-exec-8760 0...2 287308833us : 0: u00000000f4447991 [ 704.433161] syz-exec-8760 0...2 287308839us : 0: u00000000f4447991 [ 704.439813] syz-exec-8760 0...2 287308844us : 0: u00000000f4447991 [ 704.446466] syz-exec-8760 0...2 287308850us : 0: u00000000f4447991 [ 704.453125] syz-exec-8760 0...2 287308854us : 0: u00000000f4447991 [ 704.459781] syz-exec-8760 0...2 287308860us : 0: u00000000f4447991 [ 704.466437] syz-exec-8760 0...2 287308865us : 0: u00000000f4447991 [ 704.473114] syz-exec-8760 0...2 287308871us : 0: u00000000f4447991 [ 704.479786] syz-exec-8760 0...2 287308876us : 0: u00000000f4447991 [ 704.486440] syz-exec-8760 0...2 287308880us : 0: u00000000f4447991 [ 704.493118] syz-exec-8760 0...2 287308885us : 0: u00000000f4447991 [ 704.499773] syz-exec-8760 0...2 287308925us : 0: u00000000f4447991 [ 704.506430] syz-exec-8760 0...2 287308932us : 0: u00000000f4447991 [ 704.513090] syz-exec-8760 0...2 287308937us : 0: u00000000f4447991 [ 704.519750] syz-exec-8760 0...2 287308943us : 0: u00000000f4447991 [ 704.526407] syz-exec-8760 0...2 287308949us : 0: u00000000f4447991 [ 704.533062] syz-exec-8760 0...2 287308955us : 0: u00000000f4447991 [ 704.539723] syz-exec-8760 0...2 287308962us : 0: u00000000f4447991 [ 704.546380] syz-exec-8760 0...2 287308968us : 0: u00000000f4447991 [ 704.553034] syz-exec-8760 0...2 287308973us : 0: u00000000f4447991 [ 704.559688] syz-exec-8760 0...2 287308979us : 0: u00000000f4447991 [ 704.566344] syz-exec-8760 0...2 287308984us : 0: u00000000f4447991 [ 704.572999] syz-exec-8760 0...2 287308990us : 0: u00000000f4447991 [ 704.579653] syz-exec-8760 0...2 287308995us : 0: u00000000f4447991 [ 704.586310] syz-exec-8760 0...2 287309002us : 0: u00000000f4447991 [ 704.592964] syz-exec-8760 0...2 287309008us : 0: u00000000f4447991 [ 704.599618] syz-exec-8760 0...2 287309014us : 0: u00000000f4447991 [ 704.606289] syz-exec-8760 0...2 287309020us : 0: u00000000f4447991 [ 704.612942] syz-exec-8760 0...2 287309026us : 0: u00000000f4447991 [ 704.619597] syz-exec-8760 0...2 287309031us : 0: u00000000f4447991 [ 704.626259] syz-exec-8760 0...2 287309037us : 0: u00000000f4447991 [ 704.632917] syz-exec-8760 0...2 287309042us : 0: u00000000f4447991 [ 704.639569] syz-exec-8760 0...2 287309049us : 0: u00000000f4447991 [ 704.646237] syz-exec-8760 0...2 287309055us : 0: u00000000f4447991 [ 704.652914] syz-exec-8760 0...2 287309060us : 0: u00000000f4447991 [ 704.659570] syz-exec-8760 0...2 287309066us : 0: u00000000f4447991 [ 704.666252] syz-exec-8760 0...2 287309071us : 0: u00000000f4447991 [ 704.672912] syz-exec-8760 0...2 287309076us : 0: u00000000f4447991 [ 704.679570] syz-exec-8760 0...2 287309081us : 0: u00000000f4447991 [ 704.686242] syz-exec-8760 0...2 287309087us : 0: u00000000f4447991 [ 704.692901] syz-exec-8760 0...2 287309093us : 0: u00000000f4447991 [ 704.699559] syz-exec-8760 0...2 287309099us : 0: u00000000f4447991 [ 704.706227] syz-exec-8760 0...2 287309104us : 0: u00000000f4447991 [ 704.712893] syz-exec-8760 0...2 287309109us : 0: u00000000f4447991 [ 704.719552] syz-exec-8760 0...2 287309114us : 0: u00000000f4447991 [ 704.726207] syz-exec-8760 0...2 287309120us : 0: u00000000f4447991 [ 704.732874] syz-exec-8760 0...2 287309125us : 0: u00000000f4447991 [ 704.739545] syz-exec-8760 0...2 287309131us : 0: u00000000f4447991 [ 704.746203] syz-exec-8760 0...2 287309136us : 0: u00000000f4447991 [ 704.752883] syz-exec-8760 0...2 287309142us : 0: u00000000f4447991 [ 704.759542] syz-exec-8760 0...2 287309147us : 0: u00000000f4447991 [ 704.766198] syz-exec-8760 0...2 287309152us : 0: u00000000f4447991 [ 704.772864] syz-exec-8760 0...2 287309157us : 0: u00000000f4447991 [ 704.779519] syz-exec-8760 0...2 287309162us : 0: u00000000f4447991 [ 704.786178] syz-exec-8760 0...2 287309167us : 0: u00000000f4447991 [ 704.792838] syz-exec-8760 0...2 287309171us : 0: u00000000f4447991 [ 704.799493] syz-exec-8760 0...2 287309176us : 0: u00000000f4447991 [ 704.806166] syz-exec-8760 0...2 287309181us : 0: u00000000f4447991 [ 704.812842] syz-exec-8760 0...2 287309186us : 0: u00000000f4447991 [ 704.819505] syz-exec-8760 0...2 287309192us : 0: u00000000f4447991 [ 704.826181] syz-exec-8760 0...2 287309196us : 0: u00000000f4447991 [ 704.832853] syz-exec-8760 0...2 287309202us : 0: u00000000f4447991 [ 704.839526] syz-exec-8760 0...2 287309207us : 0: u00000000f4447991 [ 704.846184] syz-exec-8760 0...2 287309212us : 0: u00000000f4447991 [ 704.852840] syz-exec-8760 0...2 287309216us : 0: u00000000f4447991 [ 704.859669] syz-exec-8760 0...2 287309221us : 0: u00000000f4447991 [ 704.866328] syz-exec-8760 0...2 287309226us : 0: u00000000f4447991 [ 704.873151] syz-exec-8760 0...2 287309231us : 0: u00000000f4447991 [ 704.879806] syz-exec-8760 0...2 287309239us : 0: u00000000f4447991 [ 704.886460] syz-exec-8760 0...2 287309244us : 0: u00000000f4447991 [ 704.893122] syz-exec-8760 0...2 287309252us : 0: u00000000f4447991 [ 704.899783] syz-exec-8760 0...2 287309260us : 0: u00000000f4447991 [ 704.906440] syz-exec-8760 0...2 287309266us : 0: u00000000f4447991 [ 704.913109] syz-exec-8760 0...2 287309270us : 0: u00000000f4447991 [ 704.919767] syz-exec-8760 0...2 287309276us : 0: u00000000f4447991 [ 704.926441] syz-exec-8760 0...2 287309281us : 0: u00000000f4447991 [ 704.933108] syz-exec-8760 0...2 287309286us : 0: u00000000f4447991 [ 704.939779] syz-exec-8760 0...2 287309291us : 0: u00000000f4447991 [ 704.946435] syz-exec-8760 0...2 287309297us : 0: u00000000f4447991 [ 704.953097] syz-exec-8760 0...2 287309302us : 0: u00000000f4447991 [ 704.959762] syz-exec-8760 0...2 287309308us : 0: u00000000f4447991 [ 704.966433] syz-exec-8760 0...2 287309312us : 0: u00000000f4447991 [ 704.973096] syz-exec-8760 0...2 287309318us : 0: u00000000f4447991 [ 704.979774] syz-exec-8760 0...2 287309323us : 0: u00000000f4447991 [ 704.986432] syz-exec-8760 0...2 287309329us : 0: u00000000f4447991 [ 704.993095] syz-exec-8760 0...2 287309334us : 0: u00000000f4447991 [ 704.999758] syz-exec-8760 0...2 287309339us : 0: u00000000f4447991 [ 705.006418] syz-exec-8760 0...2 287309344us : 0: u00000000f4447991 [ 705.013075] syz-exec-8760 0...2 287309348us : 0: u00000000f4447991 [ 705.019746] syz-exec-8760 0...2 287309353us : 0: u00000000f4447991 [ 705.026404] syz-exec-8760 0...2 287309358us : 0: u00000000f4447991 [ 705.033059] syz-exec-8760 0...2 287309363us : 0: u00000000f4447991 [ 705.039721] syz-exec-8760 0...2 287309368us : 0: u00000000f4447991 [ 705.046377] syz-exec-8760 0...2 287309373us : 0: u00000000f4447991 [ 705.053033] syz-exec-8760 0...2 287309378us : 0: u00000000f4447991 [ 705.059691] syz-exec-8760 0...2 287309383us : 0: u00000000f4447991 [ 705.066346] syz-exec-8760 0...2 287309387us : 0: u00000000f4447991 [ 705.073000] syz-exec-8760 0...2 287309392us : 0: u00000000f4447991 [ 705.079674] syz-exec-8760 0...2 287309397us : 0: u00000000f4447991 [ 705.086347] syz-exec-8760 0...2 287309402us : 0: u00000000f4447991 [ 705.093006] syz-exec-8760 0...2 287309407us : 0: u00000000f4447991 [ 705.099664] syz-exec-8760 0...2 287309412us : 0: u00000000f4447991 [ 705.106324] syz-exec-8760 0...2 287309417us : 0: u00000000f4447991 [ 705.112982] syz-exec-8760 0...2 287309422us : 0: u00000000f4447991 [ 705.119664] syz-exec-8760 0...2 287309426us : 0: u00000000f4447991 [ 705.126329] syz-exec-8760 0...2 287309431us : 0: u00000000f4447991 [ 705.132991] syz-exec-8760 0...2 287309436us : 0: u00000000f4447991 [ 705.139650] syz-exec-8760 0...2 287309442us : 0: u00000000f4447991 [ 705.146315] syz-exec-8760 0...2 287309447us : 0: u00000000f4447991 [ 705.152976] syz-exec-8760 0...2 287309453us : 0: u00000000f4447991 [ 705.159643] syz-exec-8760 0...2 287309459us : 0: u00000000f4447991 [ 705.166308] syz-exec-8760 0...2 287309463us : 0: u00000000f4447991 [ 705.172974] syz-exec-8760 0...2 287309468us : 0: u00000000f4447991 [ 705.179640] syz-exec-8760 0...2 287309478us : 0: u00000000f4447991 [ 705.186305] syz-exec-8760 0...2 287309484us : 0: u00000000f4447991 [ 705.192967] syz-exec-8760 0...2 287309489us : 0: u00000000f4447991 [ 705.199629] syz-exec-8760 0...2 287309504us : 0: u00000000f4447991 [ 705.206295] syz-exec-8760 0...2 287309509us : 0: u00000000f4447991 [ 705.212959] syz-exec-8760 0...2 287309514us : 0: u00000000f4447991 [ 705.219622] syz-exec-8760 0...2 287309519us : 0: u00000000f4447991 [ 705.226287] syz-exec-8760 0...2 287309524us : 0: u00000000f4447991 [ 705.232955] syz-exec-8760 0...2 287309529us : 0: u00000000f4447991 [ 705.239628] syz-exec-8760 0...2 287309533us : 0: u00000000f4447991 [ 705.246302] syz-exec-8760 0...2 287309538us : 0: u00000000f4447991 [ 705.252964] syz-exec-8760 0...2 287309544us : 0: u00000000f4447991 [ 705.259631] syz-exec-8760 0...2 287309549us : 0: u00000000f4447991 [ 705.266292] syz-exec-8760 0...2 287309555us : 0: u00000000f4447991 [ 705.272980] syz-exec-8760 0...2 287309559us : 0: u00000000f4447991 [ 705.279638] syz-exec-8760 0...2 287309566us : 0: u00000000f4447991 [ 705.286312] syz-exec-8760 0...2 287309571us : 0: u00000000f4447991 [ 705.292970] syz-exec-8760 0...2 287309577us : 0: u00000000f4447991 [ 705.299631] syz-exec-8760 0...2 287309582us : 0: u00000000f4447991 [ 705.306287] syz-exec-8760 0...2 287309588us : 0: u00000000f4447991 [ 705.312941] syz-exec-8760 0...2 287309593us : 0: u00000000f4447991 [ 705.319596] syz-exec-8760 0...2 287309599us : 0: u00000000f4447991 [ 705.326259] syz-exec-8760 0...2 287309604us : 0: u00000000f4447991 [ 705.332917] syz-exec-8760 0...2 287309617us : 0: u00000000f4447991 [ 705.339574] syz-exec-8760 0...2 287309622us : 0: u00000000f4447991 [ 705.346241] syz-exec-8760 0...2 287309628us : 0: u00000000f4447991 [ 705.352899] syz-exec-8760 0...2 287309633us : 0: u00000000f4447991 [ 705.359554] syz-exec-8760 0...2 287309638us : 0: u00000000f4447991 [ 705.366217] syz-exec-8760 0...2 287309643us : 0: u00000000f4447991 [ 705.372881] syz-exec-8760 0...2 287309648us : 0: u00000000f4447991 [ 705.379536] syz-exec-8760 0...2 287309653us : 0: u00000000f4447991 [ 705.386191] syz-exec-8760 0...2 287309658us : 0: u00000000f4447991 [ 705.392849] syz-exec-8760 0...2 287309663us : 0: u00000000f4447991 [ 705.399503] syz-exec-8760 0...2 287309668us : 0: u00000000f4447991 [ 705.406173] syz-exec-8760 0...2 287309673us : 0: u00000000f4447991 [ 705.412830] syz-exec-8760 0...2 287309677us : 0: u00000000f4447991 [ 705.419486] syz-exec-8760 0...2 287309682us : 0: u00000000f4447991 [ 705.426142] syz-exec-8760 0...2 287309687us : 0: u00000000f4447991 [ 705.432797] syz-exec-8760 0...2 287309692us : 0: u00000000f4447991 [ 705.439452] syz-exec-8760 0...2 287309697us : 0: u00000000f4447991 [ 705.446117] syz-exec-8760 0...2 287309702us : 0: u00000000f4447991 [ 705.452773] syz-exec-8760 0...2 287309707us : 0: u00000000f4447991 [ 705.459444] syz-exec-8760 0...2 287309712us : 0: u00000000f4447991 [ 705.466112] syz-exec-8760 0...2 287309716us : 0: u00000000f4447991 [ 705.472770] syz-exec-8760 0...2 287309732us : 0: u00000000f4447991 [ 705.479425] syz-exec-8760 0...2 287309739us : 0: u00000000f4447991 [ 705.486089] syz-exec-8760 0...2 287309745us : 0: u00000000f4447991 [ 705.492750] syz-exec-8760 0...2 287309757us : 0: u00000000f4447991 [ 705.499406] syz-exec-8760 0...2 287309763us : 0: u00000000f4447991 [ 705.506061] syz-exec-8760 0...2 287309768us : 0: u00000000f4447991 [ 705.512721] syz-exec-8760 0...2 287309774us : 0: u00000000f4447991 [ 705.519375] syz-exec-8760 0...2 287309779us : 0: u00000000f4447991 [ 705.526029] syz-exec-8760 0...2 287309785us : 0: u00000000f4447991 [ 705.532687] syz-exec-8760 0.N.2 287309826us : 0: u00000000f4447991 [ 705.539343] syz-exec-8760 0...2 287327183us : 0: u00000000f4447991 [ 705.546000] syz-exec-8760 0...2 287327191us : 0: u00000000f4447991 [ 705.552670] syz-exec-8760 0...2 287327197us : 0: u00000000f4447991 [ 705.559327] syz-exec-8760 0...2 287327202us : 0: u00000000f4447991 [ 705.565981] syz-exec-8760 0...2 287327208us : 0: u00000000f4447991 [ 705.572637] syz-exec-8760 0...2 287327215us : 0: u00000000f4447991 [ 705.579290] syz-exec-8760 0...2 287327220us : 0: u00000000f4447991 [ 705.585945] syz-exec-8760 0...2 287327226us : 0: u00000000f4447991 [ 705.592601] syz-exec-8760 0...2 287327232us : 0: u00000000f4447991 [ 705.599260] syz-exec-8760 0...2 287327238us : 0: u00000000f4447991 [ 705.605914] syz-exec-8760 0...2 287327243us : 0: u00000000f4447991 [ 705.612571] syz-exec-8760 0...2 287327250us : 0: u00000000f4447991 [ 705.619240] syz-exec-8760 0...2 287327256us : 0: u00000000f4447991 [ 705.625913] syz-exec-8760 0...2 287327261us : 0: u00000000f4447991 [ 705.632568] syz-exec-8760 0...2 287327266us : 0: u00000000f4447991 [ 705.639250] syz-exec-8760 0...2 287327272us : 0: u00000000f4447991 [ 705.645908] syz-exec-8760 0...2 287327277us : 0: u00000000f4447991 [ 705.652563] syz-exec-8760 0...2 287327283us : 0: u00000000f4447991 [ 705.659228] syz-exec-8760 0...2 287327288us : 0: u00000000f4447991 [ 705.665889] syz-exec-8760 0...2 287327293us : 0: u00000000f4447991 [ 705.672544] syz-exec-8760 0...2 287327298us : 0: u00000000f4447991 [ 705.679197] syz-exec-8760 0...2 287327303us : 0: u00000000f4447991 [ 705.685856] syz-exec-8760 0...2 287327308us : 0: u00000000f4447991 [ 705.692511] syz-exec-8760 0...2 287327313us : 0: u00000000f4447991 [ 705.699163] syz-exec-8760 0...2 287327318us : 0: u00000000f4447991 [ 705.705816] syz-exec-8760 0...2 287327322us : 0: u00000000f4447991 [ 705.712474] syz-exec-8760 0...2 287327327us : 0: u00000000f4447991 [ 705.719139] syz-exec-8760 0...2 287327332us : 0: u00000000f4447991 [ 705.725795] syz-exec-8760 0...2 287327337us : 0: u00000000f4447991 [ 705.732449] syz-exec-8760 0...2 287327342us : 0: u00000000f4447991 [ 705.739116] syz-exec-8760 0...2 287327347us : 0: u00000000f4447991 [ 705.745774] syz-exec-8760 0...2 287327352us : 0: u00000000f4447991 [ 705.752444] syz-exec-8760 0...2 287327384us : 0: u00000000f4447991 [ 705.759110] syz-exec-8760 0...2 287327393us : 0: u00000000f4447991 [ 705.765768] syz-exec-8760 0...2 287327399us : 0: u00000000f4447991 [ 705.772422] syz-exec-8760 0...2 287327403us : 0: u00000000f4447991 [ 705.779076] syz-exec-8760 0...2 287327410us : 0: u00000000f4447991 [ 705.785744] syz-exec-8760 0...2 287327415us : 0: u00000000f4447991 [ 705.792419] syz-exec-8760 0...2 287327420us : 0: u00000000f4447991 [ 705.799075] syz-exec-8760 0...2 287327425us : 0: u00000000f4447991 [ 705.805828] syz-exec-8760 0...2 287327431us : 0: u00000000f4447991 [ 705.812485] syz-exec-8760 0...2 287327436us : 0: u00000000f4447991 [ 705.819139] syz-exec-8760 0...2 287327442us : 0: u00000000f4447991 [ 705.825796] syz-exec-8760 0...2 287327447us : 0: u00000000f4447991 [ 705.832452] syz-exec-8760 0...2 287327453us : 0: u00000000f4447991 [ 705.839117] syz-exec-8760 0...2 287327458us : 0: u00000000f4447991 [ 705.845776] syz-exec-8760 0...2 287327463us : 0: u00000000f4447991 [ 705.852432] syz-exec-8760 0...2 287327468us : 0: u00000000f4447991 [ 705.859094] syz-exec-8760 0...2 287327474us : 0: u00000000f4447991 [ 705.865754] syz-exec-8760 0...2 287327479us : 0: u00000000f4447991 [ 705.872409] syz-exec-8760 0...2 287327485us : 0: u00000000f4447991 [ 705.879061] syz-exec-8760 0...2 287327490us : 0: u00000000f4447991 [ 705.885724] syz-exec-8760 0...2 287327495us : 0: u00000000f4447991 [ 705.892377] syz-exec-8760 0...2 287327500us : 0: u00000000f4447991 [ 705.899032] syz-exec-8760 0...2 287327505us : 0: u00000000f4447991 [ 705.905688] syz-exec-8760 0...2 287327509us : 0: u00000000f4447991 [ 705.912344] syz-exec-8760 0...2 287327514us : 0: u00000000f4447991 [ 705.918997] syz-exec-8760 0...2 287327519us : 0: u00000000f4447991 [ 705.925653] syz-exec-8760 0...2 287327524us : 0: u00000000f4447991 [ 705.932312] syz-exec-8760 0...2 287327529us : 0: u00000000f4447991 [ 705.938969] syz-exec-8760 0...2 287327534us : 0: u00000000f4447991 [ 705.945624] syz-exec-8760 0...2 287327539us : 0: u00000000f4447991 [ 705.952280] syz-exec-8760 0...2 287327543us : 0: u00000000f4447991 [ 705.958935] syz-exec-8760 0...2 287327548us : 0: u00000000f4447991 [ 705.965766] syz-exec-8760 0...2 287327553us : 0: u00000000f4447991 [ 705.972420] syz-exec-8760 0...2 287327558us : 0: u00000000f4447991 [ 705.979077] syz-exec-8760 0...2 287327562us : 0: u00000000f4447991 [ 705.985744] syz-exec-8760 0...2 287327567us : 0: u00000000f4447991 [ 705.992399] syz-exec-8760 0...2 287327572us : 0: u00000000f4447991 [ 705.999054] syz-exec-8760 0...2 287327577us : 0: u00000000f4447991 [ 706.005709] syz-exec-8760 0...2 287327582us : 0: u00000000f4447991 [ 706.012362] syz-exec-8760 0...2 287327587us : 0: u00000000f4447991 [ 706.019017] syz-exec-8760 0...2 287327592us : 0: u00000000f4447991 [ 706.025674] syz-exec-8760 0...2 287327597us : 0: u00000000f4447991 [ 706.032331] syz-exec-8760 0...2 287327602us : 0: u00000000f4447991 [ 706.038984] syz-exec-8760 0...2 287327606us : 0: u00000000f4447991 [ 706.045637] syz-exec-8760 0...2 287327611us : 0: u00000000f4447991 [ 706.052291] syz-exec-8760 0...2 287327616us : 0: u00000000f4447991 [ 706.058962] syz-exec-8760 0...2 287327621us : 0: u00000000f4447991 [ 706.065620] syz-exec-8760 0...2 287327626us : 0: u00000000f4447991 [ 706.072281] syz-exec-8760 0...2 287327631us : 0: u00000000f4447991 [ 706.078938] syz-exec-8760 0...2 287327636us : 0: u00000000f4447991 [ 706.085592] syz-exec-8760 0...2 287327640us : 0: u00000000f4447991 [ 706.092256] syz-exec-8760 0...2 287327645us : 0: u00000000f4447991 [ 706.098915] syz-exec-8760 0...2 287327650us : 0: u00000000f4447991 [ 706.105569] syz-exec-8760 0...2 287327655us : 0: u00000000f4447991 [ 706.112236] syz-exec-8760 0...2 287327660us : 0: u00000000f4447991 [ 706.118894] syz-exec-8760 0...2 287327664us : 0: u00000000f4447991 [ 706.125548] syz-exec-8760 0...2 287327669us : 0: u00000000f4447991 [ 706.132202] syz-exec-8760 0...2 287327674us : 0: u00000000f4447991 [ 706.138882] syz-exec-8760 0...2 287327679us : 0: u00000000f4447991 [ 706.145538] syz-exec-8760 0...2 287327684us : 0: u00000000f4447991 [ 706.152192] syz-exec-8760 0...2 287327688us : 0: u00000000f4447991 [ 706.158852] syz-exec-8760 0...2 287327693us : 0: u00000000f4447991 [ 706.165505] syz-exec-8760 0...2 287327698us : 0: u00000000f4447991 [ 706.172158] syz-exec-8760 0...2 287327703us : 0: u00000000f4447991 [ 706.178811] syz-exec-8760 0...2 287327708us : 0: u00000000f4447991 [ 706.185464] syz-exec-8760 0...2 287327713us : 0: u00000000f4447991 [ 706.192123] syz-exec-8760 0...2 287327718us : 0: u00000000f4447991 [ 706.198783] syz-exec-8760 0...2 287327733us : 0: u00000000f4447991 [ 706.205437] syz-exec-8760 0...2 287327738us : 0: u00000000f4447991 [ 706.212101] syz-exec-8760 0...2 287327743us : 0: u00000000f4447991 [ 706.218761] syz-exec-8760 0...2 287327756us : 0: u00000000f4447991 [ 706.225418] syz-exec-8760 0...2 287327761us : 0: u00000000f4447991 [ 706.232070] syz-exec-8760 0...2 287327766us : 0: u00000000f4447991 [ 706.238731] syz-exec-8760 0...2 287327771us : 0: u00000000f4447991 [ 706.245403] syz-exec-8760 0...2 287327776us : 0: u00000000f4447991 [ 706.252087] syz-exec-8760 0...2 287327782us : 0: u00000000f4447991 [ 706.258765] syz-exec-8760 0...2 287327787us : 0: u00000000f4447991 [ 706.265420] syz-exec-8760 0...2 287327792us : 0: u00000000f4447991 [ 706.272076] syz-exec-8760 0...2 287327797us : 0: u00000000f4447991 [ 706.278743] syz-exec-8760 0...2 287327802us : 0: u00000000f4447991 [ 706.285399] syz-exec-8760 0...2 287327807us : 0: u00000000f4447991 [ 706.292056] syz-exec-8760 0...2 287327811us : 0: u00000000f4447991 [ 706.298732] syz-exec-8760 0...2 287327817us : 0: u00000000f4447991 [ 706.305389] syz-exec-8760 0...2 287327821us : 0: u00000000f4447991 [ 706.312043] syz-exec-8760 0...2 287327826us : 0: u00000000f4447991 [ 706.318698] syz-exec-8760 0...2 287327831us : 0: u00000000f4447991 [ 706.325380] syz-exec-8760 0...2 287327836us : 0: u00000000f4447991 [ 706.332037] syz-exec-8760 0...2 287327841us : 0: u00000000f4447991 [ 706.338694] syz-exec-8760 0...2 287327846us : 0: u00000000f4447991 [ 706.345357] syz-exec-8760 0...2 287327851us : 0: u00000000f4447991 [ 706.352015] syz-exec-8760 0...2 287327856us : 0: u00000000f4447991 [ 706.358685] syz-exec-8760 0...2 287327861us : 0: u00000000f4447991 [ 706.365341] syz-exec-8760 0...2 287327865us : 0: u00000000f4447991 [ 706.371996] syz-exec-8760 0...2 287327870us : 0: u00000000f4447991 [ 706.378650] syz-exec-8760 0...2 287327875us : 0: u00000000f4447991 [ 706.385305] syz-exec-8760 0...2 287327880us : 0: u00000000f4447991 [ 706.391995] syz-exec-8760 0.N.2 287327933us : 0: u00000000f4447991 [ 706.398653] syz-exec-8760 0...2 287369562us : 0: u00000000f4447991 [ 706.405311] syz-exec-8760 0...2 287369570us : 0: u00000000f4447991 [ 706.411967] syz-exec-8760 0...2 287369575us : 0: u00000000f4447991 [ 706.418623] syz-exec-8760 0...2 287369580us : 0: u00000000f4447991 [ 706.425279] syz-exec-8760 0...2 287369584us : 0: u00000000f4447991 [ 706.431950] syz-exec-8760 0...2 287369589us : 0: u00000000f4447991 [ 706.438607] syz-exec-8760 0...2 287369594us : 0: u00000000f4447991 [ 706.445263] syz-exec-8760 0...2 287369599us : 0: u00000000f4447991 [ 706.451919] syz-exec-8760 0...2 287369603us : 0: u00000000f4447991 [ 706.458576] syz-exec-8760 0...2 287369608us : 0: u00000000f4447991 [ 706.465241] syz-exec-8760 0...2 287369613us : 0: u00000000f4447991 [ 706.471901] syz-exec-8760 0...2 287369617us : 0: u00000000f4447991 [ 706.478556] syz-exec-8760 0...2 287369622us : 0: u00000000f4447991 [ 706.485231] syz-exec-8760 0...2 287369626us : 0: u00000000f4447991 [ 706.491892] syz-exec-8760 0...2 287369631us : 0: u00000000f4447991 [ 706.498545] syz-exec-8760 0...2 287369636us : 0: u00000000f4447991 [ 706.505201] syz-exec-8760 0...2 287369641us : 0: u00000000f4447991 [ 706.511865] syz-exec-8760 0...2 287369646us : 0: u00000000f4447991 [ 706.518520] syz-exec-8760 0...2 287369650us : 0: u00000000f4447991 [ 706.525178] syz-exec-8760 0...2 287369655us : 0: u00000000f4447991 [ 706.531832] syz-exec-8760 0...2 287369660us : 0: u00000000f4447991 [ 706.538486] syz-exec-8760 0...2 287369664us : 0: u00000000f4447991 [ 706.545142] syz-exec-8760 0...2 287369669us : 0: u00000000f4447991 [ 706.551812] syz-exec-8760 0...2 287369673us : 0: u00000000f4447991 [ 706.558467] syz-exec-8760 0...2 287369678us : 0: u00000000f4447991 [ 706.565133] syz-exec-8760 0...2 287369683us : 0: u00000000f4447991 [ 706.571787] syz-exec-8760 0...2 287369688us : 0: u00000000f4447991 [ 706.578442] syz-exec-8760 0...2 287369692us : 0: u00000000f4447991 [ 706.585112] syz-exec-8760 0...2 287369697us : 0: u00000000f4447991 [ 706.591769] syz-exec-8760 0...2 287369702us : 0: u00000000f4447991 [ 706.598426] syz-exec-8760 0...2 287369706us : 0: u00000000f4447991 [ 706.605090] syz-exec-8760 0...2 287369711us : 0: u00000000f4447991 [ 706.611767] syz-exec-8760 0...2 287369716us : 0: u00000000f4447991 [ 706.618422] syz-exec-8760 0...2 287369720us : 0: u00000000f4447991 [ 706.625078] syz-exec-8760 0...2 287369736us : 0: u00000000f4447991 [ 706.631749] syz-exec-8760 0...2 287369741us : 0: u00000000f4447991 [ 706.638405] syz-exec-8760 0...2 287369752us : 0: u00000000f4447991 [ 706.645061] syz-exec-8760 0...2 287369757us : 0: u00000000f4447991 [ 706.651725] syz-exec-8760 0...2 287369762us : 0: u00000000f4447991 [ 706.658378] syz-exec-8760 0...2 287369767us : 0: u00000000f4447991 [ 706.665032] syz-exec-8760 0...2 287369771us : 0: u00000000f4447991 [ 706.671715] syz-exec-8760 0...2 287369776us : 0: u00000000f4447991 [ 706.678371] syz-exec-8760 0...2 287369781us : 0: u00000000f4447991 [ 706.685026] syz-exec-8760 0...2 287369786us : 0: u00000000f4447991 [ 706.691682] syz-exec-8760 0...2 287369791us : 0: u00000000f4447991 [ 706.698337] syz-exec-8760 0...2 287369796us : 0: u00000000f4447991 [ 706.704991] syz-exec-8760 0...2 287369800us : 0: u00000000f4447991 [ 706.711670] syz-exec-8760 0...2 287369805us : 0: u00000000f4447991 [ 706.718334] syz-exec-8760 0...2 287369810us : 0: u00000000f4447991 [ 706.724990] syz-exec-8760 0...2 287369814us : 0: u00000000f4447991 [ 706.731645] syz-exec-8760 0...2 287369819us : 0: u00000000f4447991 [ 706.738317] syz-exec-8760 0...2 287369823us : 0: u00000000f4447991 [ 706.744988] syz-exec-8760 0...2 287369828us : 0: u00000000f4447991 [ 706.751642] syz-exec-8760 0...2 287369833us : 0: u00000000f4447991 [ 706.758299] syz-exec-8760 0...2 287369838us : 0: u00000000f4447991 [ 706.764952] syz-exec-8760 0...2 287369842us : 0: u00000000f4447991 [ 706.771609] syz-exec-8760 0...2 287369847us : 0: u00000000f4447991 [ 706.778265] syz-exec-8760 0...2 287369852us : 0: u00000000f4447991 [ 706.784920] syz-exec-8760 0...2 287369856us : 0: u00000000f4447991 [ 706.791577] syz-exec-8760 0...2 287369861us : 0: u00000000f4447991 [ 706.798253] syz-exec-8760 0...2 287369866us : 0: u00000000f4447991 [ 706.804918] syz-exec-8760 0...2 287369870us : 0: u00000000f4447991 [ 706.811571] syz-exec-8760 0...2 287369875us : 0: u00000000f4447991 [ 706.818241] syz-exec-8760 0...2 287369880us : 0: u00000000f4447991 [ 706.824900] syz-exec-8760 0...2 287369884us : 0: u00000000f4447991 [ 706.831553] syz-exec-8760 0...2 287369929us : 0: u00000000f4447991 [ 706.838210] syz-exec-8760 0...2 287369934us : 0: u00000000f4447991 [ 706.844892] syz-exec-8760 0...2 287369939us : 0: u00000000f4447991 [ 706.851562] syz-exec-8760 0...2 287369943us : 0: u00000000f4447991 [ 706.858229] syz-exec-8760 0...2 287369949us : 0: u00000000f4447991 [ 706.865113] syz-exec-8760 0...2 287369954us : 0: u00000000f4447991 [ 706.871770] syz-exec-8760 0...2 287369958us : 0: u00000000f4447991 [ 706.878429] syz-exec-8760 0...2 287369963us : 0: u00000000f4447991 [ 706.885121] syz-exec-8760 0...2 287369967us : 0: u00000000f4447991 [ 706.891777] syz-exec-8760 0...2 287369972us : 0: u00000000f4447991 [ 706.898430] syz-exec-8760 0...2 287369977us : 0: u00000000f4447991 [ 706.905094] syz-exec-8760 0...2 287369981us : 0: u00000000f4447991 [ 706.911755] syz-exec-8760 0...2 287369986us : 0: u00000000f4447991 [ 706.918411] syz-exec-8760 0...2 287369991us : 0: u00000000f4447991 [ 706.925078] syz-exec-8760 0...2 287369995us : 0: u00000000f4447991 [ 706.931748] syz-exec-8760 0...2 287370003us : 0: u00000000f4447991 [ 706.938401] syz-exec-8760 0...2 287370008us : 0: u00000000f4447991 [ 706.945055] syz-exec-8760 0...2 287370012us : 0: u00000000f4447991 [ 706.951713] syz-exec-8760 0...2 287370017us : 0: u00000000f4447991 [ 706.958366] syz-exec-8760 0...2 287370022us : 0: u00000000f4447991 [ 706.965020] syz-exec-8760 0...2 287370026us : 0: u00000000f4447991 [ 706.971674] syz-exec-8760 0...2 287370031us : 0: u00000000f4447991 [ 706.978351] syz-exec-8760 0...2 287370036us : 0: u00000000f4447991 [ 706.985007] syz-exec-8760 0...2 287370040us : 0: u00000000f4447991 [ 706.991661] syz-exec-8760 0...2 287370045us : 0: u00000000f4447991 [ 706.998320] syz-exec-8760 0...2 287370050us : 0: u00000000f4447991 [ 707.004982] syz-exec-8760 0...2 287370054us : 0: u00000000f4447991 [ 707.011634] syz-exec-8760 0...2 287370059us : 0: u00000000f4447991 [ 707.018289] syz-exec-8760 0...2 287370063us : 0: u00000000f4447991 [ 707.024945] syz-exec-8760 0...2 287370068us : 0: u00000000f4447991 [ 707.031617] syz-exec-8760 0...2 287370073us : 0: u00000000f4447991 [ 707.038272] syz-exec-8760 0...2 287370078us : 0: u00000000f4447991 [ 707.044929] syz-exec-8760 0...2 287370083us : 0: u00000000f4447991 [ 707.051584] syz-exec-8760 0...2 287370087us : 0: u00000000f4447991 [ 707.058258] syz-exec-8760 0...2 287370092us : 0: u00000000f4447991 [ 707.064914] syz-exec-8760 0...2 287370097us : 0: u00000000f4447991 [ 707.071570] syz-exec-8760 0...2 287370101us : 0: u00000000f4447991 [ 707.078238] syz-exec-8760 0...2 287370106us : 0: u00000000f4447991 [ 707.084898] syz-exec-8760 0...2 287370111us : 0: u00000000f4447991 [ 707.091552] syz-exec-8760 0...2 287370115us : 0: u00000000f4447991 [ 707.098229] syz-exec-8760 0...2 287370120us : 0: u00000000f4447991 [ 707.104891] syz-exec-8760 0...2 287370125us : 0: u00000000f4447991 [ 707.111545] syz-exec-8760 0...2 287370129us : 0: u00000000f4447991 [ 707.118201] syz-exec-8760 0...2 287370134us : 0: u00000000f4447991 [ 707.124867] syz-exec-8760 0...2 287370138us : 0: u00000000f4447991 [ 707.131524] syz-exec-8760 0...2 287370143us : 0: u00000000f4447991 [ 707.138178] syz-exec-8760 0...2 287370147us : 0: u00000000f4447991 [ 707.144831] syz-exec-8760 0...2 287370152us : 0: u00000000f4447991 [ 707.151484] syz-exec-8760 0...2 287370157us : 0: u00000000f4447991 [ 707.158141] syz-exec-8760 0...2 287370161us : 0: u00000000f4447991 [ 707.164798] syz-exec-8760 0...2 287370166us : 0: u00000000f4447991 [ 707.171454] syz-exec-8760 0...2 287370171us : 0: u00000000f4447991 [ 707.178165] syz-exec-8760 0...2 287370175us : 0: u00000000f4447991 [ 707.184829] syz-exec-8760 0...2 287370180us : 0: u00000000f4447991 [ 707.191483] syz-exec-8760 0.N.2 287370232us : 0: u00000000f4447991 [ 707.198153] syz-exec-8760 0...2 287377385us : 0: u00000000f4447991 [ 707.204809] syz-exec-8760 0...2 287377392us : 0: u00000000f4447991 [ 707.211465] syz-exec-8760 0...2 287377397us : 0: u00000000f4447991 [ 707.218125] syz-exec-8760 0...2 287377402us : 0: u00000000f4447991 [ 707.224780] syz-exec-8760 0...2 287377407us : 0: u00000000f4447991 [ 707.231434] syz-exec-8760 0...2 287377411us : 0: u00000000f4447991 [ 707.238097] syz-exec-8760 0...2 287377416us : 0: u00000000f4447991 [ 707.244760] syz-exec-8760 0...2 287377421us : 0: u00000000f4447991 [ 707.251415] syz-exec-8760 0...2 287377426us : 0: u00000000f4447991 [ 707.258091] syz-exec-8760 0...2 287377430us : 0: u00000000f4447991 [ 707.264752] syz-exec-8760 0...2 287377435us : 0: u00000000f4447991 [ 707.271406] syz-exec-8760 0...2 287377440us : 0: u00000000f4447991 [ 707.278062] syz-exec-8760 0...2 287377444us : 0: u00000000f4447991 [ 707.284743] syz-exec-8760 0...2 287377449us : 0: u00000000f4447991 [ 707.291401] syz-exec-8760 0...2 287377454us : 0: u00000000f4447991 [ 707.298058] syz-exec-8760 0...2 287377458us : 0: u00000000f4447991 [ 707.304719] syz-exec-8760 0...2 287377463us : 0: u00000000f4447991 [ 707.311373] syz-exec-8760 0...2 287377468us : 0: u00000000f4447991 [ 707.318026] syz-exec-8760 0...2 287377472us : 0: u00000000f4447991 [ 707.324680] syz-exec-8760 0...2 287377477us : 0: u00000000f4447991 [ 707.331349] syz-exec-8760 0...2 287377482us : 0: u00000000f4447991 [ 707.338004] syz-exec-8760 0...2 287377486us : 0: u00000000f4447991 [ 707.344659] syz-exec-8760 0...2 287377491us : 0: u00000000f4447991 [ 707.351314] syz-exec-8760 0...2 287377496us : 0: u00000000f4447991 [ 707.357968] syz-exec-8760 0...2 287377500us : 0: u00000000f4447991 [ 707.364627] syz-exec-8760 0...2 287377505us : 0: u00000000f4447991 [ 707.371286] syz-exec-8760 0...2 287377510us : 0: u00000000f4447991 [ 707.377940] syz-exec-8760 0...2 287377515us : 0: u00000000f4447991 [ 707.384595] syz-exec-8760 0...2 287377519us : 0: u00000000f4447991 [ 707.391256] syz-exec-8760 0...2 287377523us : 0: u00000000f4447991 [ 707.397910] syz-exec-8760 0...2 287377528us : 0: u00000000f4447991 [ 707.404565] syz-exec-8760 0...2 287377532us : 0: u00000000f4447991 [ 707.411233] syz-exec-8760 0...2 287377537us : 0: u00000000f4447991 [ 707.417894] syz-exec-8760 0...2 287377542us : 0: u00000000f4447991 [ 707.424547] syz-exec-8760 0...2 287377547us : 0: u00000000f4447991 [ 707.431200] syz-exec-8760 0...2 287377551us : 0: u00000000f4447991 [ 707.437864] syz-exec-8760 0...2 287377557us : 0: u00000000f4447991 [ 707.444518] syz-exec-8760 0...2 287377561us : 0: u00000000f4447991 [ 707.451174] syz-exec-8760 0...2 287377566us : 0: u00000000f4447991 [ 707.457827] syz-exec-8760 0...2 287377570us : 0: u00000000f4447991 [ 707.464485] syz-exec-8760 0...2 287377576us : 0: u00000000f4447991 [ 707.471155] syz-exec-8760 0...2 287377581us : 0: u00000000f4447991 [ 707.477824] syz-exec-8760 0...2 287377585us : 0: u00000000f4447991 [ 707.484479] syz-exec-8760 0...2 287377590us : 0: u00000000f4447991 [ 707.491144] syz-exec-8760 0...2 287377595us : 0: u00000000f4447991 [ 707.497798] syz-exec-8760 0...2 287377599us : 0: u00000000f4447991 [ 707.504452] syz-exec-8760 0...2 287377604us : 0: u00000000f4447991 [ 707.511116] syz-exec-8760 0...2 287377609us : 0: u00000000f4447991 [ 707.517773] syz-exec-8760 0...2 287377613us : 0: u00000000f4447991 [ 707.524429] syz-exec-8760 0...2 287377618us : 0: u00000000f4447991 [ 707.531092] syz-exec-8760 0...2 287377623us : 0: u00000000f4447991 [ 707.537764] syz-exec-8760 0...2 287377627us : 0: u00000000f4447991 [ 707.544417] syz-exec-8760 0...2 287377632us : 0: u00000000f4447991 [ 707.551073] syz-exec-8760 0...2 287377637us : 0: u00000000f4447991 [ 707.557747] syz-exec-8760 0...2 287377642us : 0: u00000000f4447991 [ 707.564415] syz-exec-8760 0...2 287377646us : 0: u00000000f4447991 [ 707.571073] syz-exec-8760 0...2 287377651us : 0: u00000000f4447991 [ 707.577739] syz-exec-8760 0...2 287377655us : 0: u00000000f4447991 [ 707.584409] syz-exec-8760 0...2 287377660us : 0: u00000000f4447991 [ 707.591067] syz-exec-8760 0...2 287377665us : 0: u00000000f4447991 [ 707.597732] syz-exec-8760 0...2 287377670us : 0: u00000000f4447991 [ 707.604389] syz-exec-8760 0...2 287377674us : 0: u00000000f4447991 [ 707.611044] syz-exec-8760 0...2 287377681us : 0: u00000000f4447991 [ 707.617700] syz-exec-8760 0...2 287377686us : 0: u00000000f4447991 [ 707.624354] syz-exec-8760 0...2 287377690us : 0: u00000000f4447991 [ 707.631010] syz-exec-8760 0...2 287377695us : 0: u00000000f4447991 [ 707.637666] syz-exec-8760 0...2 287377701us : 0: u00000000f4447991 [ 707.644322] syz-exec-8760 0...2 287377705us : 0: u00000000f4447991 [ 707.650978] syz-exec-8760 0...2 287377710us : 0: u00000000f4447991 [ 707.657633] syz-exec-8760 0...2 287377715us : 0: u00000000f4447991 [ 707.664316] syz-exec-8760 0...2 287377719us : 0: u00000000f4447991 [ 707.670973] syz-exec-8760 0...2 287377735us : 0: u00000000f4447991 [ 707.677630] syz-exec-8760 0...2 287377740us : 0: u00000000f4447991 [ 707.684291] syz-exec-8760 0...2 287377751us : 0: u00000000f4447991 [ 707.690949] syz-exec-8760 0...2 287377756us : 0: u00000000f4447991 [ 707.697604] syz-exec-8760 0...2 287377761us : 0: u00000000f4447991 [ 707.704264] syz-exec-8760 0...2 287377765us : 0: u00000000f4447991 [ 707.710938] syz-exec-8760 0...2 287377770us : 0: u00000000f4447991 [ 707.717598] syz-exec-8760 0...2 287377775us : 0: u00000000f4447991 [ 707.724262] syz-exec-8760 0...2 287377779us : 0: u00000000f4447991 [ 707.730922] syz-exec-8760 0...2 287377784us : 0: u00000000f4447991 [ 707.737584] syz-exec-8760 0...2 287377789us : 0: u00000000f4447991 [ 707.744253] syz-exec-8760 0...2 287377793us : 0: u00000000f4447991 [ 707.750917] syz-exec-8760 0...2 287377798us : 0: u00000000f4447991 [ 707.757573] syz-exec-8760 0...2 287377803us : 0: u00000000f4447991 [ 707.764243] syz-exec-8760 0...2 287377808us : 0: u00000000f4447991 [ 707.770904] syz-exec-8760 0...2 287377812us : 0: u00000000f4447991 [ 707.777561] syz-exec-8760 0...2 287377817us : 0: u00000000f4447991 [ 707.784254] syz-exec-8760 0...2 287377822us : 0: u00000000f4447991 [ 707.790922] syz-exec-8760 0...2 287377827us : 0: u00000000f4447991 [ 707.797589] syz-exec-8760 0...2 287377831us : 0: u00000000f4447991 [ 707.804280] syz-exec-8760 0...2 287377836us : 0: u00000000f4447991 [ 707.811029] syz-exec-8760 0...2 287377841us : 0: u00000000f4447991 [ 707.817703] syz-exec-8760 0...2 287377845us : 0: u00000000f4447991 [ 707.824360] syz-exec-8760 0...2 287377850us : 0: u00000000f4447991 [ 707.831016] syz-exec-8760 0...2 287377855us : 0: u00000000f4447991 [ 707.837692] syz-exec-8760 0...2 287377859us : 0: u00000000f4447991 [ 707.844349] syz-exec-8760 0...2 287377864us : 0: u00000000f4447991 [ 707.851004] syz-exec-8760 0...2 287377868us : 0: u00000000f4447991 [ 707.857659] syz-exec-8760 0...2 287377873us : 0: u00000000f4447991 [ 707.864313] syz-exec-8760 0...2 287377878us : 0: u00000000f4447991 [ 707.870969] syz-exec-8760 0...2 287377883us : 0: u00000000f4447991 [ 707.877625] syz-exec-8760 0...2 287377921us : 0: u00000000f4447991 [ 707.884286] syz-exec-8760 0...2 287377927us : 0: u00000000f4447991 [ 707.890941] syz-exec-8760 0...2 287377931us : 0: u00000000f4447991 [ 707.897597] syz-exec-8760 0...2 287377936us : 0: u00000000f4447991 [ 707.904255] syz-exec-8760 0...2 287377941us : 0: u00000000f4447991 [ 707.910915] syz-exec-8760 0...2 287377945us : 0: u00000000f4447991 [ 707.917570] syz-exec-8760 0...2 287377950us : 0: u00000000f4447991 [ 707.924262] syz-exec-8760 0...2 287377955us : 0: u00000000f4447991 [ 707.930919] syz-exec-8760 0...2 287377959us : 0: u00000000f4447991 [ 707.937574] syz-exec-8760 0...2 287377964us : 0: u00000000f4447991 [ 707.944242] syz-exec-8760 0...2 287377969us : 0: u00000000f4447991 [ 707.950903] syz-exec-8760 0...2 287377973us : 0: u00000000f4447991 [ 707.957559] syz-exec-8760 0...2 287377978us : 0: u00000000f4447991 [ 707.964220] syz-exec-8760 0...2 287377983us : 0: u00000000f4447991 [ 707.970884] syz-exec-8760 0...2 287377987us : 0: u00000000f4447991 [ 707.977542] syz-exec-8760 0...2 287377992us : 0: u00000000f4447991 [ 707.984197] syz-exec-8760 0...2 287377997us : 0: u00000000f4447991 [ 707.990859] syz-exec-8760 0...2 287378001us : 0: u00000000f4447991 [ 707.997511] syz-exec-8760 0...2 287378006us : 0: u00000000f4447991 [ 708.004167] syz-exec-8760 0...2 287378011us : 0: u00000000f4447991 [ 708.010820] syz-exec-8760 0...2 287378015us : 0: u00000000f4447991 [ 708.017474] syz-exec-8760 0...2 287378020us : 0: u00000000f4447991 [ 708.024132] syz-exec-8760 0...2 287378025us : 0: u00000000f4447991 [ 708.030790] syz-exec-8760 0...2 287378029us : 0: u00000000f4447991 [ 708.037446] syz-exec-8760 0...2 287378034us : 0: u00000000f4447991 [ 708.044114] syz-exec-8760 0...2 287378038us : 0: u00000000f4447991 [ 708.050770] syz-exec-8760 0...2 287378043us : 0: u00000000f4447991 [ 708.057424] syz-exec-8760 0...2 287378048us : 0: u00000000f4447991 [ 708.064087] syz-exec-8760 0...2 287378052us : 0: u00000000f4447991 [ 708.070754] syz-exec-8760 0...2 287378057us : 0: u00000000f4447991 [ 708.077409] syz-exec-8760 0...2 287378062us : 0: u00000000f4447991 [ 708.084062] syz-exec-8760 0...2 287378066us : 0: u00000000f4447991 [ 708.090723] syz-exec-8760 0...2 287378071us : 0: u00000000f4447991 [ 708.097376] syz-exec-8760 0...2 287378076us : 0: u00000000f4447991 [ 708.104032] syz-exec-8760 0...2 287378080us : 0: u00000000f4447991 [ 708.110687] syz-exec-8760 0...2 287378085us : 0: u00000000f4447991 [ 708.117358] syz-exec-8760 0...2 287378090us : 0: u00000000f4447991 [ 708.124026] syz-exec-8760 0...2 287378094us : 0: u00000000f4447991 [ 708.130681] syz-exec-8760 0...2 287378099us : 0: u00000000f4447991 [ 708.137338] syz-exec-8760 0...2 287378104us : 0: u00000000f4447991 [ 708.143994] syz-exec-8760 0...2 287378109us : 0: u00000000f4447991 [ 708.150647] syz-exec-8760 0...2 287378113us : 0: u00000000f4447991 [ 708.157302] syz-exec-8760 0...2 287378118us : 0: u00000000f4447991 [ 708.163956] syz-exec-8760 0...2 287378123us : 0: u00000000f4447991 [ 708.170628] syz-exec-8760 0...2 287378127us : 0: u00000000f4447991 [ 708.177285] syz-exec-8760 0...2 287378132us : 0: u00000000f4447991 [ 708.183941] syz-exec-8760 0...2 287378137us : 0: u00000000f4447991 [ 708.190612] syz-exec-8760 0...2 287378141us : 0: u00000000f4447991 [ 708.197275] syz-exec-8760 0...2 287378146us : 0: u00000000f4447991 [ 708.203945] syz-exec-8760 0...2 287378150us : 0: u00000000f4447991 [ 708.210598] syz-exec-8760 0...2 287378155us : 0: u00000000f4447991 [ 708.217264] syz-exec-8760 0...2 287378160us : 0: u00000000f4447991 [ 708.223917] syz-exec-8760 0...2 287378164us : 0: u00000000f4447991 [ 708.230569] syz-exec-8760 0...2 287378169us : 0: u00000000f4447991 [ 708.237235] syz-exec-8760 0...2 287378174us : 0: u00000000f4447991 [ 708.243917] syz-exec-8760 0...2 287378178us : 0: u00000000f4447991 [ 708.250573] syz-exec-8760 0...2 287378183us : 0: u00000000f4447991 [ 708.257251] syz-exec-8760 0...2 287378188us : 0: u00000000f4447991 [ 708.263906] syz-exec-8760 0...2 287378192us : 0: u00000000f4447991 [ 708.270576] syz-exec-8760 0...2 287378197us : 0: u00000000f4447991 [ 708.277245] syz-exec-8760 0...2 287378202us : 0: u00000000f4447991 [ 708.283902] syz-exec-8760 0...2 287378206us : 0: u00000000f4447991 [ 708.290556] syz-exec-8760 0...2 287378213us : 0: u00000000f4447991 [ 708.297222] syz-exec-8760 0...2 287378217us : 0: u00000000f4447991 [ 708.303885] syz-exec-8760 0...2 287378222us : 0: u00000000f4447991 [ 708.310539] syz-exec-8760 0...2 287378227us : 0: u00000000f4447991 [ 708.317195] syz-exec-8760 0...2 287378232us : 0: u00000000f4447991 [ 708.323858] syz-exec-8760 0...2 287378236us : 0: u00000000f4447991 [ 708.330513] syz-exec-8760 0...2 287378241us : 0: u00000000f4447991 [ 708.337167] syz-exec-8760 0...2 287378245us : 0: u00000000f4447991 [ 708.343823] syz-exec-8760 0...2 287378251us : 0: u00000000f4447991 [ 708.350476] syz-exec-8760 0...2 287378255us : 0: u00000000f4447991 [ 708.357136] syz-exec-8760 0.N.2 287378306us : 0: u00000000f4447991 [ 708.363777] --------------------------------- [ 708.388402] ---[ end trace 1a03e0c3eefeccbd ]--- [ 708.393244] RIP: 0010:nbd_ioctl+0x53c/0xcf0 [ 708.397603] Code: ea 03 80 3c 02 00 0f 85 1c 07 00 00 48 8b b5 c0 fe ff ff 48 63 8d b8 fe ff ff 48 8b 86 c8 00 00 00 48 8d be c0 00 00 00 48 99 <48> f7 f9 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c [ 708.416925] RSP: 0018:ffff88019255f828 EFLAGS: 00010246 [ 708.422594] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 708.430040] RDX: 0000000000000000 RSI: ffff8801c9964ac0 RDI: ffff8801c9964b80 [ 708.438126] RBP: ffff88019255f9a0 R08: ffff8801afcfc3c0 R09: ffffed003a592bb5 [ 708.445434] R10: ffff88019255f818 R11: ffff8801d2c95daf R12: ffff8801d2c95cc0 [ 708.452774] R13: 00000000ffffffe7 R14: ffff8801d2c95da0 R15: ffff8801da806040 [ 708.460096] FS: 00007fe72263a700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 708.468364] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 708.474765] CR2: 0000001b33021000 CR3: 00000001c4de7000 CR4: 00000000001406f0 [ 708.482074] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 708.489391] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 708.496716] Kernel panic - not syncing: Fatal exception [ 708.502404] Dumping ftrace buffer: [ 708.505928] (ftrace buffer empty) [ 708.509617] Kernel Offset: disabled [ 708.513225] Rebooting in 86400 seconds..