20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20800, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 854.022757] XFS (loop5): SB sanity check failed [ 854.027575] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffc7c, 0xd5, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x20000}, 0x8000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000)=0x3a, 0x8) [ 854.095027] XFS (loop5): Unmount and run xfs_repair [ 854.124723] FAULT_INJECTION: forcing a failure. [ 854.124723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 854.127043] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 854.136641] CPU: 1 PID: 6897 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 854.136649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.136654] Call Trace: [ 854.136675] dump_stack+0x1b2/0x283 [ 854.136704] should_fail.cold+0x10a/0x154 [ 854.136721] __alloc_pages_nodemask+0x22b/0x2730 [ 854.136752] ? generic_file_write_iter+0x37a/0x650 [ 854.136765] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 854.136776] ? check_preemption_disabled+0x35/0x240 [ 854.136797] ? perf_trace_lock_acquire+0x4b0/0x4b0 [ 854.136809] ? HARDIRQ_verbose+0x10/0x10 [ 854.136817] ? perf_trace_lock+0x109/0x4b0 [ 854.136834] cache_grow_begin+0x91/0x410 [ 854.136847] cache_alloc_refill+0x28c/0x360 [ 854.136868] kmem_cache_alloc+0x333/0x3c0 [ 854.202315] ffff8882186a1000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 854.203617] getname_flags+0xc8/0x550 [ 854.203632] do_sys_open+0x202/0x3e0 [ 854.211048] ffff8882186a1010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 854.211999] ? filp_open+0x60/0x60 [ 854.212009] ? SyS_pwrite64+0xca/0x140 [ 854.212020] ? fput+0xb/0x140 [ 854.212031] ? do_syscall_64+0x4c/0x640 [ 854.212040] ? do_sys_open+0x3e0/0x3e0 [ 854.212051] do_syscall_64+0x1d5/0x640 [ 854.212070] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 854.212079] RIP: 0033:0x416851 [ 854.212084] RSP: 002b:00007f92d3345a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 854.212096] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 0000000000416851 [ 854.212102] RDX: 00007f92d3345b0a RSI: 0000000000000002 RDI: 00007f92d3345b00 [ 854.212108] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 854.212114] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 854.212119] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f92d33466d4 [ 854.327724] ffff8882186a1020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 854.338036] ffff8882186a1030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 854.353969] XFS (loop5): SB validate failed with error -117. [ 854.391160] XFS (loop0): Mounting V4 Filesystem [ 854.429384] XFS (loop0): totally zeroed log [ 854.439240] XFS (loop0): failed to read root inode [ 854.524870] XFS (loop5): SB sanity check failed [ 854.529616] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 854.550841] XFS (loop5): Unmount and run xfs_repair [ 854.564053] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 854.570817] ffff888216f7d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 854.581123] ffff888216f7d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 854.592303] ffff888216f7d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 854.601167] ffff888216f7d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 854.611419] XFS (loop5): SB validate failed with error -117. [ 854.613966] XFS (loop0): Mounting V4 Filesystem 01:47:30 executing program 1 (fault-call:2 fault-nth:9): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 854.629058] XFS (loop0): totally zeroed log [ 854.633798] XFS (loop0): failed to read root inode 01:47:30 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000140)={0x2, 0x9, @name="c67928a801636c5d6ba1ee8c9da0ae9adb009cafd346f70d245f27b2185c5504"}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) 01:47:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_RMFB(r3, 0xc00464af, &(0x7f0000000100)=0x6) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000000)='\x00', 0x1) [ 854.706039] FAULT_INJECTION: forcing a failure. [ 854.706039] name failslab, interval 1, probability 0, space 0, times 0 [ 854.717902] CPU: 0 PID: 6951 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 854.725723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.735071] Call Trace: [ 854.737723] dump_stack+0x1b2/0x283 [ 854.741347] should_fail.cold+0x10a/0x154 [ 854.745490] should_failslab+0xd6/0x130 [ 854.749483] kmem_cache_alloc+0x28e/0x3c0 [ 854.753626] get_empty_filp+0x86/0x3e0 [ 854.757502] path_openat+0x87/0x2aa0 [ 854.761207] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 854.765724] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 854.770225] ? kmem_cache_alloc+0x124/0x3c0 [ 854.774548] ? getname_flags+0xc8/0x550 [ 854.778519] ? do_sys_open+0x202/0x3e0 [ 854.782412] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 854.787784] ? path_mountpoint+0x960/0x960 [ 854.792024] ? perf_trace_lock+0x109/0x4b0 [ 854.796264] do_filp_open+0x18e/0x250 [ 854.800053] ? may_open_dev+0xe0/0xe0 [ 854.803849] ? __alloc_fd+0x1bf/0x490 [ 854.807639] ? lock_acquire+0x170/0x3f0 [ 854.811599] ? lock_downgrade+0x6e0/0x6e0 [ 854.815745] ? do_raw_spin_unlock+0x164/0x250 [ 854.820242] ? __alloc_fd+0x1bf/0x490 [ 854.824032] do_sys_open+0x292/0x3e0 [ 854.827744] ? filp_open+0x60/0x60 [ 854.831296] ? SyS_pwrite64+0xca/0x140 [ 854.835186] ? fput+0xb/0x140 [ 854.838289] ? do_syscall_64+0x4c/0x640 [ 854.842260] ? do_sys_open+0x3e0/0x3e0 [ 854.846143] do_syscall_64+0x1d5/0x640 [ 854.850021] entry_SYSCALL_64_after_hwframe+0x46/0xbb 01:47:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000001c0)={0x4d, 0x3, 0x8, 0x47, 0x8, 0x6, 0xf883}, &(0x7f0000000200)={0x8, 0x9, 0x8, 0xcd4, 0x1, 0x0, 0x4, 0x6}, &(0x7f0000000240)={0x8, 0xffffffff, 0xc3, 0x8000, 0xfffffffffffffffa, 0x101, 0x8, 0x8}, &(0x7f0000000280)={0x77359400}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x7]}, 0x8}) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000000c0)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 854.855197] RIP: 0033:0x416851 [ 854.858389] RSP: 002b:00007f92d3345a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 854.866173] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 0000000000416851 [ 854.873445] RDX: 00007f92d3345b0a RSI: 0000000000000002 RDI: 00007f92d3345b00 [ 854.880719] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 854.887995] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 854.895270] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f92d33466d4 01:47:30 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x10, 0x0) ptrace$peeksig(0x11, r0, 0x0, 0x0) 01:47:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) pause() mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth0\x00', 0x870a}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)) [ 855.015350] XFS (loop3): Mounting V4 Filesystem 01:47:30 executing program 1 (fault-call:2 fault-nth:10): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 855.060273] attempt to access beyond end of device [ 855.093439] loop3: rw=4096, want=131073, limit=131071 [ 855.109396] XFS (loop3): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 855.120335] XFS (loop5): SB sanity check failed [ 855.120798] XFS (loop3): empty log check failed [ 855.130826] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 855.133100] XFS (loop3): log mount/recovery failed: error -5 [ 855.150998] XFS (loop3): log mount failed 01:47:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000240)={0x8001, 0x7, {r2}, {r4}, 0x96, 0x7bee6842}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="666900000000000000010000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) socket$inet6(0xa, 0x2, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c6be9f3746572000000000000000000000000000000000000000000000000000004000000a563cfe71a3c43bf20dc27cfc7149ee7aee2d385dddff60c230536c2a322cd5f14a4d84fa084d776084b7af2c90cc13b2b2fdbfb0c412e1b4fcb83487efb1150914545"], &(0x7f0000000080)=0x2c) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000000)={r7, 0x100000}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r8}, 0x8) [ 855.188626] XFS (loop5): Unmount and run xfs_repair [ 855.205456] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 855.235508] ffff888218810000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 855.252515] ffff888218810010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 855.262113] ffff888218810020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 855.275466] ffff888218810030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x4040801}, 0x1) [ 855.285164] XFS (loop5): SB validate failed with error -117. [ 855.303018] XFS (loop0): Mounting V4 Filesystem [ 855.333315] XFS (loop3): Mounting V4 Filesystem [ 855.343579] XFS (loop3): AIL initialisation failed: error -12 [ 855.358481] XFS (loop0): totally zeroed log [ 855.360923] XFS (loop3): log mount failed [ 855.363947] XFS (loop0): failed to read root inode 01:47:31 executing program 5: clone(0xa1000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x810, r0, 0xc2944000) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r2, 0xc0984124, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r5, r7, 0x0) keyctl$reject(0x13, 0x0, 0xf6, 0x5, r5) set_robust_list(&(0x7f00000001c0)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x7fff, &(0x7f0000000140)={&(0x7f0000000100)}}, 0x18) 01:47:31 executing program 1: clone(0x20002000ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)="050053420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000002000040000000000000d880000000048000d0000000d8a0000000100001000000059dd334400000000035ab424000000ec00000c090a02c4ccbd890a4de013cbf7ecdf1aa71a2b3931042b24e09a6d0f170615d966a16318fd948018b6c71d48d3f5325e3f7fa4e920d82518c1a2c1210576b35d86a3d94f89f7cbb6314e5cedc7a6fc39e67808dde15554aa74a00d2d60aea861f12d657dfb50a26352fc4a60eada7087c823ac5e26ef42c3", 0xe1}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000200)={'broute\x00'}, &(0x7f0000000280)=0x78) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$NFT_MSG_GETOBJ_RESET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x68, 0x15, 0xa, 0x3, 0x0, 0x0, {0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x60000000) 01:47:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe71b2f62c6b7a473c5a609"], &(0x7f0000000080)=0x2c) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000040)={0x34}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:31 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x10, 0x0) ptrace$peeksig(0x11, r0, 0x0, 0x0) 01:47:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10a1}, 0x80}, 0x0, 0xc, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='ramfs\x00', 0x8, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:31 executing program 3: exit_group(0x0) r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x9, 0x100) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b40)=ANY=[@ANYBLOB="74130233d8781717c29cc225c3b073dac901a1b8d0194c5951bfa16356dcab9435134b668942971a966012b67975d93553a02fc951f1a70580d75a4bc8556fa53fbdd9a648505c059c30b8d0dd6715fd8f0eae1705694b0886adb30d4b0edf12b7", @ANYRESOCT=r3, @ANYBLOB="17090000000000000000010000000500070000000000080009000000000014002000fe80000000000000000000000000003908000a0000000000060002000100000014001f00000000000000000000000000000000006838f07873a745561fc2bc0f0ebfbc962004693ae336aa19f447daca59d802fa0c9921578d7b969e55a619f5126865a39a989d3042edd2a4cbaabc9faebceb1dc88ce6eaf27eece99c9c9a69ff31f272ef73d58649bc4a2a3e95b99d71ab622b23e2642848ddaff3d272bb189aa2b1"], 0x5c}}, 0x20000004) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x1c0, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, &(0x7f00000003c0), {[{{@ipv6={@loopback, @remote, [0xff, 0x0, 0xffffff00, 0xff], [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 'bond_slave_0\x00', 'batadv0\x00', {}, {0xff}, 0x2c, 0x3, 0x1, 0x13}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ipv6={@private0, @private0={0xfc, 0x0, [], 0x1}, [0x0, 0xffffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffff00, 0xffffffff], 'ip6tnl0\x00', 'veth0_to_bond\x00', {}, {}, 0x5c, 0x6, 0x7, 0x10}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@remote, 'gretap0\x00', {0x10001}}}}, {{@ipv6={@empty, @mcast2, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xff, 0x0, 0xffffffff, 0xffffffff], '\x00', 'ip_vti0\x00', {}, {0xff}, 0x3c, 0x8, 0x2, 0x14}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0xc9, 0x48, 0x1}}, @common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x1, 0xd, [0x4e20, 0x4e21, 0x4e21, 0x4e22, 0x4e24, 0x4e22, 0x4e22, 0x4e23, 0x4e21, 0x4e24, 0x4e24, 0x4e23, 0x4e22, 0x4e24, 0x4e22], [0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1], 0x1}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x1, 0xc0, 0xc25c}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x222200, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="48a961fb629db53d4d2cbab6c6cf9781db32181cd5bb2e610bce6f1291cd5555f3c7a1f2f13c7105e85151b96757e2efa29e8007f1844fa9366840f9ae49ccc785147e1e90215fe45cecdcd17b7cb6cad0ac3bcb19a7bbf042cb66db722da4414898159507accd", @ANYRES16=r2, @ANYBLOB="00082dbd7000ffdbdf250300fc01000000000000000000586457ec56a24894b8d675000000000008001700000000000000", @ANYRES32=r5, @ANYBLOB="080011000100000005000600ff00000014000800626f6e645f736c6176655f3000000000"], 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x20004000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c7465720008000000000000000000000000000000000000424ab4dab884624756928cf7e6fe5fd200000000000004000000a5630000"], &(0x7f0000000080)=0x2c) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r7, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r8, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xb74}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008080}, 0xc094) 01:47:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x10000008006) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x280841, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$RTC_WIE_ON(r7, 0x700f) [ 855.864750] XFS (loop0): Invalid superblock magic number 01:47:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 855.943878] XFS (loop5): SB sanity check failed [ 855.949215] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 856.016296] XFS (loop5): Unmount and run xfs_repair 01:47:31 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r2, r4, 0x0) ioprio_get$uid(0x0, r4) r5 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000000)=0x1, 0x4) r6 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f00000001c0)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 856.040648] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 856.066439] ffff88805d36e000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 856.096774] ffff88805d36e010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 856.140692] ffff88805d36e020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3ffdffc, 0x0, &(0x7f00000000c0), 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xffffffff) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000011c1554e44855089d349e257c9a091000000000000000000000000003f9031fc8fedccd7b837e9d41f9fd357e3da06c6f80df25d8914b5e1ca11dc73adb27d45d4dc9c5097989bb8474e2bf74178cc27cc11358a853b6efa66da4f8f29eed21de469d899cb1cda8443936596fa3f7a"], &(0x7f0000000080)=0x2c) write$P9_RREMOVE(r1, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000100)={0x6, 0x3, 0x4}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000140)=0x9) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000380)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x40, r5, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x95}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_NET_NODEID={0xfffffffffffffc93, 0x3, 0xffffffff}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x1a8) [ 856.143747] XFS (loop0): Mounting V4 Filesystem [ 856.162774] ffff88805d36e030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 856.209489] XFS (loop0): totally zeroed log [ 856.225494] XFS (loop5): SB validate failed with error -117. [ 856.231676] XFS (loop0): failed to read root inode 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x7fffffff, 0x0, &(0x7f00000000c0), 0x0, 0x0) [ 856.317713] XFS (loop3): Mounting V4 Filesystem [ 856.331011] attempt to access beyond end of device [ 856.351802] loop3: rw=4096, want=131073, limit=131071 [ 856.377801] XFS (loop3): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x70, r2, 0x800, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x880) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x1679) 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 856.432934] XFS (loop3): empty log check failed [ 856.437702] XFS (loop3): log mount/recovery failed: error -5 [ 856.447964] XFS (loop3): log mount failed 01:47:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x2c) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000040)}) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r4}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000300)={r4, 0xa0f, 0x875, 0x1}, 0x10) r5 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x10, 0x3fb, 0x1, 0x70bd2b, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000940}, 0x5) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="010006000000000000001b00000008009a000200d2"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x88, r7, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_SCAN_SSIDS={0x74, 0x2d, 0x0, 0x1, [{0xe, 0x0, [0x6, 0x1b, 0xc, 0x19, 0x15, 0x1d, 0x2, 0x2, 0x17, 0xc]}, {0x5, 0x0, [0x10]}, {0x9, 0x0, [0x14, 0xe, 0x1b, 0x19, 0x15]}, {0xa, 0x0, [0x1f, 0x20, 0x2, 0x12, 0x1, 0x1d]}, {0x8, 0x0, [0x9, 0xe, 0x7, 0x15]}, {0x9, 0x0, [0x1, 0x18, 0x16, 0x9, 0x12]}, {0x6, 0x0, [0x7, 0x12]}, {0xb, 0x0, [0x1b, 0x1a, 0x10, 0x5, 0x4, 0x10, 0xa]}, {0x9, 0x0, [0x1b, 0x16, 0x16, 0x1b, 0x3]}, {0xb, 0x0, [0x12, 0x8, 0x7, 0x3, 0x9, 0x1, 0xd]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000081}, 0x10) [ 856.623085] XFS (loop5): SB sanity check failed [ 856.627822] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 856.641052] XFS (loop5): Unmount and run xfs_repair [ 856.647236] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 856.655211] ffff888218dde000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 856.664983] ffff888218dde010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 856.674970] ffff888218dde020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 856.688472] ffff888218dde030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 856.700341] XFS (loop5): SB validate failed with error -117. 01:47:32 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x10, r0) ptrace$peeksig(0x11, 0x0, 0x0, 0x0) 01:47:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = dup(0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x5, 0x0, 0x25dfdbf9, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x2c}, 0x1, 0x6c}, 0x4004000) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYRES16=r4, @ANYBLOB="000425bd7000fc57df25010000000500050000016c3bdb5a9f7d3572600a603f081761dfb6a734d332672101b84daa019fd1cf9a04cde9973d9270ebbd6ceaa77219406932fa41"], 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x14) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x40, r4, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x81}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000004}, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) inotify_add_watch(r1, &(0x7f0000000040)='./file0/../file0\x00', 0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x10000099f}, {0x0, 0x0, 0x5c6fc6e3}], 0x1000000, 0x0) 01:47:32 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 856.806462] XFS (loop5): SB sanity check failed 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x4, &(0x7f0000000480)=[{&(0x7f0000000100)="bf8dad7583de453a59f999798f251da86c21437c88f34c9564c0fab4c8df759d515b4a5c9d", 0x25, 0x5}, {&(0x7f00000001c0)="fa10fb3f114081dd166a1d81cf9a6be6d5c90508d3c41e7a8bb571b2b12bc089e8e8e37e72ff2ca8d7485769905f77c1a3202300087ca05f8b9917648acbac9ed0e7e48bbc910677d923be4407959420dac61937b57ee581dcc1f4fef4ca35acf52912f85c37eb19832d457fb77cf70238dae4543d37f57bbce10683fa7c22bc682333dd677d83a63866676f53320a9c95a41f8d26d1116fdedcf83d4ce1d26233734c1b218e9383461c3b76d0e013a4d35b9c5a7b01451fe86b7c4cdffe6c41e05b2dabfd2f36815e66719e8dc449498c94f49d66d84354", 0xd8, 0x9}, {&(0x7f00000002c0)="7e29e3604bf60d3d614570ff800111d810e1b69619ff502bfdb01ea8c86ded535806b92161fa74a7d695733b1a5eea9066f49edadf2d4f210ab2c7193d4c5e5a91bf48ddd5b4ed08d089cac5330f1034b3dd1227cc092157f8056b700fdd4d74fdaa739b34cedf5e6a90aab4afa091a173bda452b4266637f8d502a45c3987b8436659ceee23048a9ee25b14935da4d4e81fe5110f509a0b637ce140987eb7604dd9d81c15", 0xa5, 0x6d}, {&(0x7f0000000380)="2b15c74deefcdcbe07c5e17002271ad942e1e4d95030ed18efb63338219e1e2c8c48e542d09c4fd2647de3cef84ff2cc5d6f2d6e71d9d10fed452030c851f15f3001dde360885bfeab34350cfff828b5b7b374ba918b5a8bb7f244b8bcca700e29ead3fa4dbbf0b2a85ada26b2ed6032c8b571410c791094870e0f5e896ecf0fb08be32aeb69cc23a2f3dcb8c84d53bf6ae5f979e60d1d024530e41c5ff12295835efe1ef46d9d6262638cafcf051e2ca989c3d9fbba93ee4d9de0eb5200d5cfd8023ddc1f10ed", 0xc7, 0x6d6}], 0x102040, 0x0) clock_gettime(0x4, &(0x7f0000000140)) [ 856.829994] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 856.869722] XFS (loop5): Unmount and run xfs_repair [ 856.878079] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 856.886694] ffff888219c71000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 856.901481] ffff888219c71010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 856.918024] ffff888219c71020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40c00, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 856.927688] ffff888219c71030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 856.928873] XFS (loop3): Mounting V4 Filesystem [ 856.939200] XFS (loop5): SB validate failed with error -117. [ 856.969443] XFS (loop0): Invalid superblock magic number 01:47:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x42000, 0x0) [ 856.981203] attempt to access beyond end of device 01:47:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x3, 0x2, 0x2, 0x6, 0x1, 0x7fffffff, 0x945, 0x7ff, r3}, &(0x7f00000003c0)=0x20) syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x48, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="aed33641cc6a54c8b6dc7905283a243a33ade15943a23cbb081b954d72650c01cd097a8b0b955f20367e13c5831e7274f30c38da6d59de6f6849b4bd5dcd0753d2bc9f9438f5f3a52d1869ff595e3a39ce07bcc6472fc76fee8302473b947b104ca878cd8cb8fb2413b6848976950a0f334d844b540f3ca01ebfff52182e59d5644729c81c4e975ba0f0663e96fca636b39198c39df505df97c746d98cf764ad6e87d2492034705eeafc410c262af7550a1e55b389e8c5e1ffb670b157fc9c4b17504611c012be8da8b218ace6bc86dfc786adc2568225b8eae73195d599c8d1cc", 0xe1, 0x7}], 0x2d1040, &(0x7f0000000340)={[{@balloc_border='block-allocator=border'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x808, &(0x7f0000000140)='\x00') mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 857.013549] loop3: rw=4096, want=131073, limit=131071 [ 857.032004] XFS (loop3): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 857.041244] XFS (loop3): empty log check failed 01:47:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x1]}, 0x0, 0x8) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$9p(r1, &(0x7f00000001c0)="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", 0x1000) 01:47:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xf03}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e22, 0x38000000, @rand_addr=' \x01\x00', 0x1}}, 0x2, 0xff, 0x6, 0x9, 0x98, 0x76, 0x23}, &(0x7f00000001c0)=0x9c) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 857.105695] XFS (loop3): log mount/recovery failed: error -5 [ 857.142011] XFS (loop3): log mount failed [ 857.240991] XFS (loop5): SB sanity check failed [ 857.261462] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 857.276163] XFS (loop5): Unmount and run xfs_repair [ 857.281630] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 857.291003] ffff888218873000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 857.302087] ffff888218873010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 857.311349] ffff888218873020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 857.311432] XFS (loop3): Mounting V4 Filesystem [ 857.322229] ffff888218873030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 857.347672] XFS (loop3): AIL initialisation failed: error -12 [ 857.348541] XFS (loop5): SB validate failed with error -117. [ 857.390152] XFS (loop3): log mount failed 01:47:33 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x10, r0) ptrace$peeksig(0x11, 0x0, 0x0, 0x0) 01:47:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r3, 0x80000000}, &(0x7f0000000180)=0x8) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r5, 0x110, 0x4, &(0x7f00000001c0)=0x1, 0x4) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="666900000000000000000057a2a0d98f614000000092105f9e2851fba9cfe700000000e1b004632e00000000000000"], &(0x7f0000000080)=0x2c) write$ppp(r7, &(0x7f0000000000)="c542b9630649dfe3ab59d6d2f0f7b8ccdaeb47fb7f7de85695246e6349672f71a8d99721c80f2764b860008fba8ff035bf8249274a457dab3b9535c6fdca1ac11818e18b537e94ec", 0x48) 01:47:33 executing program 1: prctl$PR_GET_SECCOMP(0x15) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x420000, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x11, &(0x7f0000000300)=0x401, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) geteuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) fcntl$notify(0xffffffffffffffff, 0x402, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000cd9920f927515b18f39ddeb64c04000000a563cfe72fa14f0311f9b4142bfb1904247902adc183545357a49e40cf74aea058801c4d23dc1542d6b9affae3c8fac36985d828caa178a2385050486f4b4ce9ca87fd91ac823430d2a60bbfe95f2fb9140f9b14de56d9be212533bc25aece6647888d69cf8722fd3af46097fb7c3f6dd2f745c2b86fad6c188cc0a50ad5104b6cd59dd56e69ebe01c76adda26a1b17798906987bfb9c7ec84e49012e02fc3b332305e8c302ba9d9e89332ad3e63ea"], &(0x7f0000000080)=0x2c) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000180)={0x7ff, 0x5, 0x7}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x280000, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f0000000140), &(0x7f00000004c0)=0x4) ioctl$sock_ax25_SIOCDELRT(r4, 0x890c, &(0x7f0000000440)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) sendmsg$IPSET_CMD_GET_BYINDEX(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000000f06010100000000000000000c00000406000b000100000725ffff00ffffffffff000b0001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x84}, 0x8005) 01:47:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x3) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$UHID_INPUT(r2, &(0x7f0000000200)={0x8, {"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", 0x1000}}, 0x1006) r3 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000000c0)) 01:47:33 executing program 5: clone(0x50000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r1, r3, 0x0) r4 = add_key$fscrypt_provisioning(&(0x7f0000000140)='fscrypt-provisioning\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x0, 0x0, "37a2201eb35b5f7e1e795ab1ac4a011555a822952495a77db05baedf17"}, 0x25, r1) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/30, 0x1e) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r6, 0x0) r7 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r7, 0x5, 0x8, 0xfffffffffffffffd) getgid() openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x48100, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:33 executing program 3: clone(0x2a800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x17, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:33 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000000)=0x1000) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000}}, 0x0, 0xffffffffffffff7e, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r1, 0x40044103, &(0x7f0000000180)=0x3c) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', 'ramfs\x00'}, &(0x7f0000000100)=']-@)+.\x00', 0x7, 0x2) chdir(&(0x7f0000000140)='./file0\x00') 01:47:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe757936c64bc6aa8b375d92cc54846cf226c8df9f275cfe1bb0bbab0f3eb011d5469952405e1cbc7bce43996e73435d9dc261fa1cf1f235b1e93ebc14efdb60cc75f5042d78893ac34de97ac429ec398d239ceb100091ebafa5a43caa08017de"], &(0x7f0000000080)=0x2c) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x10}}, 0xa) exit_group(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0xdc, &(0x7f0000000240)=[@in6={0xa, 0x4f24, 0x0, @local, 0x3}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0xffffffff, @dev={0xfe, 0x80, [], 0x38}, 0x6}, @in6={0xa, 0x4e20, 0x4, @ipv4={[], [], @multicast1}, 0x5}, @in6={0xa, 0x4e21, 0x7, @remote, 0x1}, @in6={0xa, 0x4e23, 0x6, @remote, 0x44}, @in={0x2, 0x4e23, @rand_addr=0x64010100}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @in={0x2, 0x4e22, @remote}]}, &(0x7f0000000380)=0x10) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.syz\x00', &(0x7f00000001c0)=""/86, 0x56) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a, 0x4}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000480)=[@in={0x2, 0x4e20, @rand_addr=0x640100fe}, @in={0x2, 0x4e22, @loopback}], 0xaf) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) accept4$inet6(r4, 0x0, &(0x7f00000004c0), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) [ 857.713465] XFS (loop0): Mounting V4 Filesystem 01:47:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000180)=[0x5, 0x7]) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000140), 0x4) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "3fc0f071fa36f154ab89e5dc6f2372b78cf29e66"}, 0x15, 0x1) [ 857.747718] XFS (loop0): totally zeroed log [ 857.755484] XFS (loop0): failed to read root inode [ 857.827470] XFS (loop3): Mounting V4 Filesystem 01:47:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x2, 0x5c6fc6e3}], 0x0, 0x0) [ 857.850902] attempt to access beyond end of device 01:47:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$inet6(r2, &(0x7f0000001980)={0xa, 0x4e21, 0x3ff, @local, 0x5}, 0x1c) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000001900)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000018c0)={&(0x7f0000001840)={0x60, 0x2, 0x3, 0x3, 0x0, 0x0, {0x3}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x26}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x400}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}, @NFQA_CFG_PARAMS={0x9, 0x2, {0xfffffff7, 0x2}}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x2b}}, @NFQA_CFG_CMD={0x8, 0x1, {0x3, 0x0, 0x29}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x8001}, 0x20004480) r3 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r3, &(0x7f00000017c0)={&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000140)=""/209, 0xd1}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/92, 0x5c}], 0x3, &(0x7f0000001740)=[@rdma_args={0x48, 0x114, 0x1, {{0x42b8, 0x7ca}, {&(0x7f00000003c0)=""/4096, 0x1000}, &(0x7f0000001600)=[{&(0x7f00000013c0)=""/205, 0xcd}, {&(0x7f00000014c0)=""/50, 0x32}, {&(0x7f0000001500)=""/216, 0xd8}], 0x3, 0x2, 0x2}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001640)=""/181, 0xb5}, &(0x7f0000001700), 0x14}}], 0x78, 0x240080cc}, 0x4000805) open(&(0x7f0000001940)='./file0\x00', 0x100, 0x187) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 857.887311] loop3: rw=4096, want=131073, limit=131071 [ 857.920766] XFS (loop3): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 857.947298] XFS (loop5): Invalid superblock magic number [ 857.949378] XFS (loop3): empty log check failed [ 857.979593] XFS (loop3): log mount/recovery failed: error -5 [ 857.997209] XFS (loop3): log mount failed [ 858.024760] XFS (loop0): Mounting V4 Filesystem [ 858.062499] XFS (loop0): totally zeroed log [ 858.080118] XFS (loop0): failed to read root inode [ 858.129578] XFS (loop5): Invalid superblock magic number 01:47:36 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x10, r0) ptrace$peeksig(0x11, 0x0, 0x0, 0x0) 01:47:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4403, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 01:47:36 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) recvmsg$can_raw(r1, &(0x7f00000014c0)={&(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000140)=""/7, 0x7}, {&(0x7f0000000240)=""/131, 0x83}, {&(0x7f0000000300)=""/108, 0x6c}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, &(0x7f00000013c0)=""/194, 0xc2}, 0x4) setsockopt$llc_int(r2, 0x10c, 0x9, &(0x7f0000001500)=0x11, 0x4) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:36 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x4, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x2a) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r1}, 0xc) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000002c0)={0x0, 0x7, &(0x7f0000000040)=[0xe443, 0x1, 0x3, 0x9, 0x3, 0x1, 0x0], &(0x7f00000001c0)=[0x1, 0x9, 0x3, 0x8, 0x458, 0x7], 0x11, 0x2, 0x101, &(0x7f0000000200)=[0x5, 0x532f7796], &(0x7f0000000280)=[0x0, 0x8]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x7df, r1}, 0x8) 01:47:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x4, &(0x7f00000011c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}, {&(0x7f00000001c0)="c4eec3cfe700aa0d10f2a82c7e96fd93c84c1361d8162d30f1e42f96b5e9e631f4f634aeeecff7536de0205a7597287a35a783c182e7cd97958de0a96866a789be185fc90251717bb18960c8aa21c368af0a06da4e9c77ba58e48b32f2ad726fde84e014b17fab581827011f4a55bc0c138e1c7ecf4eb852d1265916ce72c5f58704520e4466cbf8bfcf31082ca8135a718c33f0b4de91686972be280d94ed01146472b30b6d5e2a283681c0962a691980f2d2b4995ac82540064202d894607c173572c0ac0577baec72ad54dc51773b37d8178f1b9b94b3b5ba9664541e9ad387844b5be79d97bb1f7dc1b7a8f2d9c0e73ab9d0dc642c00006e78137a7f6afa857c78880aedd8f1aeb98185f68abf1f39572a3fec4940d2f4c7e21908c40bf14383f1d52688070aac8a3d0b4f222a732e5372a24f43b0d91df961f94459cc1a8467f90aefe92a8a2038c25b2ac679bba9c7695b4cddc5d364913741942e58769229bb157caa668f937c4008ef25e5abe9c36f0d0549f23e0cde1a9d415da815349a916e7c0c7d1addeda26e32139a02eb35ee7b7b307c43bf3fad2f7265e05455aaa0f530d8a279866137ca93f279564b3122f36111950405b1b105f98d0dda6c04f22f20dde6d2606c67a6ba8041d858ca1d82e46624f9cb0a63749c1387a9ef41d2d982c46b96d40be789589cd270e510e879953073b619c67a85678751b06e7a9b72ce4fe6167321207a1252d4552cc99d77b96db1ef91ed24ef1d6df6e41ad4baed69f6d755fd6b86f054b549c590c0a1e9ec55466e4311ac74744b04be7fa103cf6419bde3d2e816964bd66e4852728554e66c29daae832ebc58f8573eaa6d97515bf7ead5c60dbdb5d792c221c2a58b932ba9db5773c213f5f2d656d9a21e725eddfd9d5f1e2c388f356ad7debcb85c14554aa313a7be970bd4da9c581a4afef0ccecac2dcc1f08575135cd905e5b85ef92a793fb5e12932a77066158db2b45d4720c6aae2c06d0fc5ab69a21688882c27ed930b7f8ba8236198075c8ddaad862e9b05fe3c8fd138f1db06df935223187b8142cd4089333f41d469de7d458c4f3e7f45b9cec9b8711afd0a1d2a3412e34cd9775261cb623f80f72ceec8b9f894a7d31289d613e42004195a92ebc3163d689fea98d0f94cfdb0eee88d049db1b8887831165eb04c955664e0cebf93871e0349119be514bfc9115b5d0f4c4cafa9042be5dd7943008254718179096d4ac839a9ccadf9ca927c67ae38405a4b47ab21c33b387e2b1ce62181c49852d15c0c1a18ed6ba597f267ce901845c45b6c24bfe7fd4c44b6a1ac2d24e96461f84a64acd91c011be04619c86a9ac60b919700199f83626789e1a824f5db24b1c4b394b1e644b768c46a4125903cbcebcfaf6fecefbf30da59b29b549b38261fecb25549365f41e23752c86f4fd04c3a4d61862605b8eb3353f5dc7e7979de918f74b25057cf8604e9ea0819fbdaa0ed695714f12b369d593845dde78514b27b6a8226eb1a12bf4a8c5b3de14c93e986f8f0be69af4947e98f61e2878e15e6ee13255b1b9fb392b2c668930dcb8ff7b6694ab40301aa78ddf72c60ee3ea0bfdbd6242b4fef3adeec5b81f26923efc326550c2167a72f1c74b23997b7bc3a814c6459e670862a1f6988e2643ae1ddbc82731e525db5f71a9a3701571525749d7cfcb0ba8b8275a82487a2772ba298d40b3b7d60142b866871e7cba382f48ca6e0644ad9caa754faae98b940c59a63654698ea91748bbc469a3c4d6da7d31e18886180e4c48710e9bcc3da6fe8fe60b9cacfcbbf2413f92c13e2bcd7dbbc28d621f29c5aa0af356ecc5c96ad5cd49ef78155ecbbe326f2b24671f9afa3739de13965858ef28436a619016ba765eee1a28d18f0b0b1f1084f3f1bc54d08f82c273bba116c3fac6c99c12cceb3c6e16c833c6a5263ca5149726c6b37838007e8aa2bc94c978d8a541c344036ad581b2d6969c47acbfe626910f2d07b961bb3b6cb964c8274b1423ff005c1bffa86a0493f2f0e1ce25ea19c88dfb62e38c92ba08d401981119b6f51ec2f4a0012b27234c0ea2ca5b4d6615feeeb3519f6f8ad2ba24155f3a709e0c9803314642341bb34e6f2380f6c9d05efc315bb7eead28a22c646a2a504ba51f761ee8c940bfdb018e263e49640ccc1d365a06e6ff784c262c2b2052478983015151c59fc853266722467c902a5fa24019cf8adf4cba327f940bc44ea9ea237de6b76b0b31f4fe03089b0d8d5726eb1c5110fcb9cb032ae05018f3f7e39e71132ea7691d4249cd9345664ad304771f897affdc7093d2d30cffe02b12cb2bb99e75e6c4673517f6ab8c60372de4db2b417bd447a1e1e327ccd98d3fbfb65d60111b3ad4e0e6ce2afad4dc496fafc140a8a297f77a437789c9727524469388202445f5f48492c04491356e69acd941345d82fe34baafe51533210a70e47f5a411404c4a7d37732ad87051f75d776b4e38fd3e327cac1bef7c4c814b5c1e8fe2c725595c081fb9cca036b53954f502baa17c81a8efe3b931725d95df14af11c3326a07ed42e58baa2da66dfe2f7548941ea8870cd7fd8f79cf1d6298a2a2cd5d4f2eb025a1feca56069d4fe9a6d66f2a6e7e68a7b42e5ae26df8b8eb31bdaa098fab81d4da3b75bea357dfc14aeea24de03d46dd2379afd0c5af6658f0f7e0e6a757540c84645611cc384143ef7d0fd9be4c2dc055f626c51d5be23b9901d0d1e96a30bea01183fd241f4ab1d4acad56de5050cf629b07550ec6e8f7e6033aa880945b463e2b6b28d51fc391b4b83399cb74a0ca86cbd923fcf33f2033224b1e67521c7019f903098eccabe511ca46681d32431cb6034336e194169e89c228ad8e2902fff26732cc28ab7b8f684e6d318f4ff50f7a40e8e57d3d86deca6690621c9dabdba902963b764337c284d985831321553cf749de38d5cff7b3f1d67f295daeeb9b610b4f4aaeb60f9a981f3fc33d02447ba48cc14488dcd3e29eab80c111c06cf54bc02c1b0b406cad81727a6bdce54bf034c1b048116619e4e5b386e2630559a0c9b8bc1652fa173f5ba6e204e84450020140178e1b1ce4863e8e1f37b829c2ee7375360705970cbb011b608296fa6a0c5b60542202259e8a301e93be99c8c6f2a38727e099653b86382d7523302092224f7b589be8d32284be6763cd7129d0f73de84b43ecc306b1fe80d50f261496869e383b7fd717a097d077a04789c0df811b22e5e2d42f68ad8975d63337b7a87a9439efdf53500dcff8a0c06f75ee9f4d48965531f8c42411ac5e79d64a4c70f7769753f97d86ea461a8a7d96d35f6bc2646a74a6b927b7453b5d24b8168bd158478ceabb8720015bb927f206e8866e4c8b6e59618b3e0628d79166323da3794ce905019e78a12f814c9345bcc5d4c29ed5c06bddfe8f64495a2e47958afa0221ae49228b23c582c9d218f43133a879f1f0cba62e2b5af68b6c9db87db620c1870cde67940fbe824e68ab14e03e28cf4437d11f0789e1e6e968d26c83fbe095fa6c5367ed9fffbe3c8e19041c8a843d1696a58d14c43a2711f1ce411219aeea26ed64ad589fcefe9fb3df52ce6966d336a812356f8f11c975448dde7e97da90422c2277f4b9bd274eb0c41e56d7830de6960f62c4ef26f1b2782c3a9be426a9260921ca422537e45733f76ce12856bc9af089a0d2c6197bfc1050e28ad9167c11d5a7a1564adfb63107540aa2e1198bd3cf7a491366f2bf699a26598156ed95d89d7443c69f121cc09f780372cfd97f124f8f3077d1b063b45ac22668de1b01c9d8a40931ade643561fd94795447695632ced93d13123602ad911ec313378142e8eb2102efaff3d9536fd6eda4e13161d5728f962e47c6c03c0e316e1c57a190405f829306da3c6ccacffb4cf8945816fa32869bae7a72f09d3702dfc50da863e66ae339821b8c055a00105f94bdc8d6dac236bb2efac8a0fab1461f9b8d3632e970c4437852d9c0983e84c68476edd33c944030159f5435f7c25f74e8769a54d51feab4b9811abb029dbe9bbb5c51de70e5465b7052be9e2e808f692f5beed4ac32bf977fa66b15c73b0a86c5ba8a79734cb9a7585b38d4fb6ed97326a8984200dbf599c7364c2a81a6a85cf6fe62ade7ee2a64c9ab323b92f194e5dbf40c0f5b9a378be0ecbf67e3ec86909c839ed66344d5ab269553b7eb344815e2115ceece017991b01328f1942db18d4c7a1c4af8ce823ab6d01281536ad2f9c7db7600f1258b7621413fda8a7069fecc69808eec471c617cfc1ed20eaf4954fc98b772fb8d5a38d806a70f122d7a15194cadc86fa0ccc6ee328443cf3587ecc1a0d638a3c03c77b6161eaf2bab00490128817ab0fb603de297c1704dbe06c3848ed5949873131a3010821c168703271d2b4703bf2ef037f85bf239d7e6afe035aaffc0b4bbbbd057603cbadc23ac75ff9c8e5956cf88b8889c3dc05da423f4046ebfac3b9bcb04432acf23e13c5446ec568702a2f608448b365273ac444f679f6091c34004934db747f1a57b08bfa66b47bebb17f5a763ec78ac806df11533220345bb30dd5a395921f9632d2bde76277ace99e67392af01dc0ac293f9c5c6fc25d8a6213d0aeb2bd79c1c78d4a1fff75fcd9af8e52d0991287c8487acd7f7e07c851e192cdb3740e03280d0a3299d9b65efe941d4ca6e4b0e0854a031f08e4d9a8e96b490a2bb76e20cd8b2a5222bcdf302abaa32576abe7dd75abd5c1a1ca0a2b8c2d9328e67171f048b3f490bff58dda4d0c61e0ec194a20120541867c935c68f2e6da368735285614d39e846439dfe80d982eb77eaca1f00366b2243480336cf78ca1a13010a625cd5fee16ba76af141fb417ccce0a3975fc6e540b13dbc86ab5c218cabc1c5a6f154116be00bc3f13f02a9876004a075e61f260a72ef01591b6aeed78c2709578d73bc7777daeead7cb907ea84b29491f6f5d2069f051fbfbdcf75db0c59e64e068b693c56bbc55fd3bf954ca1d4975d132e0d0cb97df4036f283430700df5508f5f710d3d737a7e53e963eed801cd93981db419b80baef853beebba667b8174ff9c8252be3d086ae5876436cb598b88645f42859fea0644f3f3d036a978abfd5761cb275ae7862131a50af6940b6336f1133a889e0797104fa05d2157e7c73bb2134dce2e8116e28efece3a6956a5d7c83182c1d407e473372499be632e00e8cf2be26b6b447084b07f732a58f598cbd3aa9405a5f0364086da6e5596fcf126b3754ee968cf69048a6a8b12c3a31db8dfc93bc04b16b5c3b1f4be6457b764dc2fc243d380728b90b3713a778f15c34718ea18df6b7b48ad59b854d2eec7dc64b5d732264d8b5ba6c25fc57d1f989038c1b3d0b8a3f51c572213c42899581b89038e37ccb324c4b2bf871edc935d86a1d1fd5086415f77c03984c6bd283223c6f7c5499390e0867d9239317d6a68578c3793954719bb62e01006c46f22f63028a5dd33e4859649d3deecd9fd403aa02882df0da21f3a630c404ad2e52dd5eb95b7c1b66325396c87f99174288fa3f5d09053443e5d7b1ba479428f71f5df39b1af7bd6a4eca2fbe61fe157f02921abd8438c87fd880ce629478ab202916f149c5713f49f04fecdda114cf97d162b9ff346078eb5b29d95f832f80ef38616297f0519b18104e914359c33e0354e21d764139be5861c83a85b097d8c4d789978201c16cc8487d66d8aa99b3421b3925f3b2b9a17e36409120603e4ec703fe43f828dd21fb1c467e65b59cb9a242c3ace02a92a", 0x1000, 0x3}, {&(0x7f0000000000)="ae5eab049db513158e74c8612f0cf379416ecb6fbdc319bccacce898", 0x1c, 0x2f}, {&(0x7f0000000100)="b65e18a0cfec03de1a35a0a5536643b9544457b2eaec62799ab9fc131c490b368b3087f3ec4b159ab8b7f5a338abe7fa6883b36cdb6f6fd431c045e54bdaa31018f46c12a5037b65e5012cde795aca8168", 0x51, 0x4}], 0x0, 0x0) 01:47:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="93b2000000000000000001"], 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 01:47:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000100)=0x78) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) chdir(&(0x7f0000000140)='./file0\x00') 01:47:36 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r2, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4}}, @NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8}, @NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0x3f}, @NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x1000}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) [ 860.770967] XFS (loop5): Invalid superblock magic number [ 860.781076] XFS (loop0): Mounting V4 Filesystem [ 860.800907] XFS (loop0): totally zeroed log 01:47:36 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x3, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x2, 0x8000000000002b9, &(0x7f0000d83f60), 0x0) io_destroy(r0) io_getevents(r0, 0x14c, 0x9, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000000)={0x0, 0x3938700}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 860.864830] XFS (loop0): failed to read root inode 01:47:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xa2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfff, 0x1ce03) 01:47:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f00000012c0)=[{&(0x7f00000001c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d88000000004000fb080000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000002000000000000029c08c258502682f28ca6b5c550c9c5f280a3107c7ba2d77b89688da48ab3f0bf366791cdc279b2cc144b4333bacbf72ec828fbace24375abfca09447f8924b00fb42104ebd02c8e5276c911b77746773c37bfe7ecf53c1e904ceee5cc762cabf5ee1a494316f476645a0", 0xe6, 0x5fa4}, {0x0, 0x0, 0x5c6fc6e9}, {&(0x7f00000002c0)="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", 0x1000, 0xffffffffffffffff}, {&(0x7f00000000c0)="0ad2a47e423b9cd7d1f84f6f5b00f95fad8b8b2f696c556fde19b0cb0a9ec77bf6b7a8727095d0c19d3e68da4e702d44ae1298092e3f5007cdb67f6774152ea7dcfea24abb50f98513358dbb2e7f043870e9164cc9fe373ea14859a4c3bdc81693e83a846b5835e220c18a485327b5ada6543677aac421f57a979ae3f8bf5605ebc3cd84dc2d35c70495812c70ac8ba1dc4767b6275114b53de66cd909c102bb2cf0cebe611d49769264eada78d5f8c73a19ffc5cec2b86c88849dd774aba9258d6c0cbd", 0xc4, 0x80000000004}], 0x1007c20, 0x0) [ 860.960960] XFS (loop3): Mounting V4 Filesystem [ 860.987151] attempt to access beyond end of device [ 860.992766] loop3: rw=4096, want=131073, limit=131071 [ 861.011867] XFS (loop3): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 861.021281] XFS (loop3): empty log check failed [ 861.027116] XFS (loop3): log mount/recovery failed: error -5 [ 861.034886] XFS (loop3): log mount failed [ 861.063529] XFS (loop5): SB sanity check failed [ 861.069413] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 861.115661] XFS (loop5): Unmount and run xfs_repair [ 861.130201] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 861.148037] ffff8882186dc000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 861.157354] ffff8882186dc010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.174976] ffff8882186dc020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 861.186767] ffff8882186dc030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 861.204320] XFS (loop3): Mounting V4 Filesystem [ 861.208887] XFS (loop5): SB validate failed with error -117. [ 861.209981] XFS (loop3): AIL initialisation failed: error -12 [ 861.230886] XFS (loop3): log mount failed [ 861.340256] XFS (loop5): SB sanity check failed [ 861.346240] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 861.358236] XFS (loop5): Unmount and run xfs_repair [ 861.367381] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 861.387662] ffff888219306000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 861.396896] ffff888219306010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.407026] ffff888219306020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 861.416676] ffff888219306030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 861.427281] XFS (loop5): SB validate failed with error -117. 01:47:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bind$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='tmpfs\x00', 0x2040000, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000009000000000000000000000000000000040000f8a563cfe7"], &(0x7f0000000080)=0x2c) dup(r1) 01:47:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x10001) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x10001}, {&(0x7f00000001c0)="cbae20663869e919d648707d0c55515b508edab8af9ec71d60066d55e6495625eb74085a3f27169e05a27a6baa9cd5327307ae70c79314b0cd4f44fef1ad1f7f95378f72d4c035974178710f31b09811b49cc80cbe6d896390b06561f69027bf89ffd1ab413e39ccb47266497330df9509474e62fa150313f667cbf6ffc455bf6744d1f26f43250c5b5dde191f14b98201e3ee7b39b6b80220ce2a4a7f96495da19964a28f4a5a5ca4c4343aa027ea796481b9778256e640b4e679864d7b7c8b5089fa80e69205481189cca407fede82931fb1", 0xd3, 0x4}], 0x0, 0x0) 01:47:37 executing program 1: clone(0x2000204437c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8a0000007503007f0000003253d925c6e424c7238cd8d5fc176c8168061f93002ff05a99d244ab60f7be25560037888e5d4f5b9ea1559f72bedd4c03f09bf9d95cb9c47800004784b6312f846d9b9eef007c4db103d913b7994b1bb7766223171ef3519d6004082690ec54f58951c56b9ead384590467ad72c9e9ec1f78584bd827ba035db58854bf2d5"], 0x8a) 01:47:37 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x531002, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) 01:47:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x4, 0xfff7ffc5) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000001c0)={0x0, @bt={0x20, 0x10000, 0x1, 0x2, 0x9, 0x1, 0x5, 0x9, 0x6693, 0xffff, 0xfffffffe, 0x4, 0x6, 0x4, 0x9, 0x0, {0x6, 0x6833}, 0x1}}) openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) 01:47:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:37 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$can_bcm(0x1d, 0x2, 0x2) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0xfffffffffffffeb0, 0x8000}, {&(0x7f00000001c0)="0885ebcc58d9b4c2ff7c2451ec2725e68b202b4598e877f5e4094af3aff0b6f711433e485a107ed6e82d6100d0b7a3326c5b8639c17b176309dfcaa02872d549f08ce4bda3fcc83adbdfd41567ffff623b72e80990ec3b384c6035008bc6eb13ecfb6cc3e940e8a0a694b18203bedec2a90448df3aa5816d63b190e966a88045a1e939afef89035b8632d244a1a8f3377dae812c25191f5f7198c667a2f87deb05e44c53b632c7eb2ed3449eda94138515719b16fa614d5b0aec67d859306f", 0x0, 0x8}, {&(0x7f0000000280)="3de62fd06153af4fe41bd8296e37e8ad00ee11d72c2897ea5e60091b3c4fcee16f290fe153f28b792f615c4d7e4f3bb6c39edfb87dc901f182c0ba8d27ed98a0aeca5a7f63fb8e79a502968abe52908e55c1a17d5162e0389dfa5eb2e3508b47fe809bb20d42e94fbe76a68c462c1514cd8d8221b156aa4d4aeacf973e72634697514c76dbfaadc9291386a1fed7ada13ced613bc704a45bc193a51c2bde7d18bccea2c3b0df12b815c2872636614190d8fc99332df43d4d81ff6053ab65495cdcc79e67", 0x0, 0x9}], 0x0, 0x0) [ 861.667569] XFS (loop5): SB sanity check failed [ 861.682173] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 861.742503] XFS (loop5): Unmount and run xfs_repair [ 861.756253] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 861.768186] XFS (loop0): bad version [ 861.769660] ffff888218580000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 861.778232] XFS (loop0): SB validate failed with error -22. [ 861.783566] ffff888218580010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.804758] ffff888218580020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 861.814273] ffff888218580030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 861.822800] XFS (loop4): Mounting V4 Filesystem [ 861.828196] XFS (loop5): SB validate failed with error -117. 01:47:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0xde, "f9fbbff67b098e733d7c98f10b30beceb50d68e709b1d7c2fd3d91a807fdb0749b51115913793414f73045e36666f4d68bb43c5a7657f532ac16e5102554bdf04c7dd9bead85d8b630c686ff611bba028dd1c86ddd419b5a13567ce43632e47e5d3cf32f6e928d8e828c4524327c71c1c523ab69ceec152d3c6815eedc66f2184618337e66de75c6b89356915dfdb101b6cbef2b52531e94c68a42317234c1e27ed605a5b5e8a016a3be572cb8e3474b157a930a93db185bd1009003a28b58c002f358898547e930899badffebfb6b0be7756b80f5a2f99ea27968b79465"}, &(0x7f0000000080)=0x102) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x4) [ 861.845771] attempt to access beyond end of device [ 861.857718] loop4: rw=4096, want=131073, limit=131071 [ 861.873222] XFS (loop3): Mounting V4 Filesystem [ 861.888528] attempt to access beyond end of device [ 861.899602] loop3: rw=4096, want=131073, limit=131071 [ 861.931288] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 861.956635] XFS (loop3): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 01:47:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0}], 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000000c0)=""/38, &(0x7f0000000100)=0x26) [ 861.980160] XFS (loop4): empty log check failed [ 862.001291] XFS (loop3): empty log check failed [ 862.006289] XFS (loop4): log mount/recovery failed: error -5 [ 862.023133] XFS (loop3): log mount/recovery failed: error -5 01:47:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0xaa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000b40)={0x1c, 0x0, 0x301, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x1c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80000000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48080}, 0x14) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563d7e7"}, &(0x7f0000000080)=0x28) ioctl$KDDISABIO(r6, 0x4b37) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x2, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r7, 0x4020565b, &(0x7f00000001c0)={0x6, 0x4, 0x2}) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 862.034380] XFS (loop4): log mount failed [ 862.049023] XFS (loop3): log mount failed 01:47:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x80) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000380)=@v2={0x2, @aes128, 0x10, [], "3afb105a34d950f1d50b5d231b33ee85"}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$IPSET_CMD_DEL(r5, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x94, 0xa, 0x6, 0x3, 0x0, 0x0, {0x3f1b4f23f1966d99, 0x0, 0x1}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1ff}, @IPSET_ATTR_ADT={0x78, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x57}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x4}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth1_to_batadv\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x33}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x3}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x80000000}}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x24048810}, 0x8000) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="0b696c7465720000000000000000000000000000000000000000000000ea000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x81, 0x2}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a, 0x400000000000}], 0x200000, 0x0) 01:47:38 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:38 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x240, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/4096) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f00000000c0)="584653420000100000001700000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000c63cc38e0000ec00000c090a02", 0x7c}, {0x0, 0x4e, 0x5c6fc6e3}], 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$SIOCRSACCEPT(r1, 0x89e3) 01:47:38 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x531002, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) [ 862.154259] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 01:47:38 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000080)=0x7, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$OSF_MSG_ADD(r3, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x4bc, 0x0, 0x5, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [{{0x254, 0x1, {{0x2, 0x8}, 0x6, 0x0, 0x81, 0x8, 0xe, 'syz0\x00', "ca70d26640e26b943a37984d58c66e908867cedaa0153c5dd7144acd1b6e8f44", "922eb79df893c886dee830cea57fa79ea074b4e32019ba75e9afae6d3a16caa9", [{0x0, 0x81, {0x1, 0x5bb}}, {0x6, 0x1, {0x2, 0x2}}, {0x7ff, 0x40, {0x2, 0x8}}, {0x7, 0x3, {0x1, 0xc9f}}, {0x9e0, 0x9b55, {0x2, 0x1}}, {0x8, 0x26, {0x1, 0x7}}, {0x2, 0x7, {0x3, 0x200}}, {0x7ff, 0x20, {0x0, 0x100}}, {0xf800, 0x7, {0x0, 0x5}}, {0xfff, 0x3, {0x2, 0x8}}, {0x4, 0x3, {0x1}}, {0x2, 0x101, {0x1, 0x5}}, {0x54, 0x7f, {0x1, 0xda2f}}, {0x0, 0x5, {0x3, 0x8}}, {0x7f, 0x4, {0x1, 0x2}}, {0x101, 0x1000, {0x3, 0x80000000}}, {0x1, 0xfff, {0x0, 0x9}}, {0x80, 0xff, {0x3, 0xffffffc0}}, {0x5, 0x35, {0x1, 0x5}}, {0x7, 0x3, {0x0, 0x7ff}}, {0x0, 0x2, {0x0, 0x20}}, {0x1, 0x8, {0x0, 0x7fffffff}}, {0x3, 0x64e, {0x2, 0x4}}, {0x9, 0x6, {0x3, 0x7}}, {0x9, 0x65, {0x2, 0x3}}, {0x3, 0x2, {0x1, 0xe75}}, {0x1, 0xffff, {0x1, 0x4}}, {0x2, 0x7fff, {0x0, 0x1}}, {0xfffc, 0x9, {0x1, 0x6}}, {0x40, 0x6, {0x2, 0xd239}}, {0xb9aa, 0x5, {0x0, 0x67c866e7}}, {0x3e2, 0xfff8, {0x3, 0x1}}, {0x69d, 0xff, {0x3, 0x8001}}, {0xfffa, 0x6, {0x3, 0x2}}, {0x78, 0x7fff, {0x3, 0x6}}, {0x85, 0x10, {0x0, 0x4}}, {0x41, 0x2b, {0x1, 0x75000000}}, {0x3f, 0x5, {0x1, 0x5}}, {0x3, 0x0, {0x2, 0x3}}, {0xff, 0x9, {0x0, 0x6}}]}}}, {{0x254, 0x1, {{0x0, 0x3}, 0x3, 0xb5, 0xdd1d, 0x20, 0x18, 'syz1\x00', "c9bfa55928077344142e96a7cc091487de0f102d25d9e718477182b94a19aa4a", "700201b5ccfe6a001219520a1e16e48d4ede8ee707bed2e23da775258b50ec34", [{0x4, 0x8000, {0x3, 0x8}}, {0x1000, 0x9, {0x1, 0x7}}, {0x1ff, 0x1, {0x3, 0x800}}, {0xff, 0xae04, {0x1, 0x20}}, {0x80, 0xfffc, {0x1, 0x43dcf712}}, {0x1, 0x6, {0x0, 0x90}}, {0x2, 0x8000, {0x3, 0x9}}, {0xc000, 0x0, {0x1, 0xffffffff}}, {0x6, 0x3, {0x0, 0xfff}}, {0x1f, 0x1, {0x3, 0x1}}, {0x81, 0x3, {0x1, 0xffffffff}}, {0xff01, 0x7, {0x2, 0x4}}, {0x3, 0x4, {0x0, 0x6}}, {0x3, 0x0, {0x3, 0x400}}, {0x9, 0x800, {0x0, 0x7}}, {0x9dd5, 0x8, {0x1, 0x9}}, {0x4, 0x9, {0x1, 0x1f}}, {0x5, 0x400, {0x0, 0x9}}, {0x7fff, 0x3, {0x1, 0x6}}, {0x3, 0xfff, {0x0, 0xffffffe0}}, {0x1, 0x32a9, {0x3, 0xdf49}}, {0x7, 0x3, {0x2, 0x4}}, {0x3, 0xc61c, {0x1, 0x401}}, {0x0, 0x200, {0x3, 0x7}}, {0x0, 0xbe80, {0x0, 0x2fe}}, {0x8000, 0x5, {0x1, 0x3f}}, {0x400, 0x92f, {0x0, 0x6}}, {0x3ff, 0x4, {0x0, 0x81}}, {0x81, 0x2, {0x3, 0x1}}, {0x2, 0x2, {0x1, 0x7fff}}, {0xed, 0x3, {0x0, 0x5}}, {0x7, 0x2, {0x2, 0x2}}, {0xf4, 0x1, {0x3, 0x1}}, {0x7, 0x7, {0x1, 0x1}}, {0x2, 0x3f, {0x0, 0xf6}}, {0x3, 0x5, {0x0, 0x800}}, {0xc000, 0x2de2}, {0x7, 0x5, {0x3, 0x5}}, {0x9, 0x9, {0x3, 0x1}}, {0x9, 0x5, {0x1, 0x7f}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x801}, 0x20000014) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffc, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {&(0x7f00000001c0)="42205b9e7fa1974ac5813373a8af1e6c896c54ece70f7fb646f93c73d8af5a5c356adf4804c5ac9462db539ab1d6f4b6d241737d01211cd19d91a15d53d603388e3766be2238c50623670372e517a85ebc93ac6542a5ffa7d3638697430ab86b29fa10e4f56b8448f18c2f12e1332fc771208f0c7a789797a09b23d0c5017455ff4a82a6f592fefcc75422022b8f99677e57b42aec2378d387ed33cce90b2742283f0e2915d18d072e33", 0xaa}], 0x0, 0x0) 01:47:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvme-fabrics\x00', 0x507000, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x2, 0x7, 0x4, 0x4, 0x800, {0x0, 0xea60}, {0x1, 0x1, 0xf9, 0x28, 0x1d, 0x6, "a72c4ec5"}, 0x1371, 0x2, @userptr=0xfffffffffffffffc, 0xffff, 0x0, r2}) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SIOCPNADDRESOURCE(r1, 0x89e0, &(0x7f0000000000)=0x80) [ 862.329492] XFS (loop5): Invalid superblock magic number [ 862.387835] XFS (loop3): Mounting V4 Filesystem [ 862.404429] XFS (loop3): totally zeroed log [ 862.418638] XFS (loop3): failed to read root inode 01:47:38 executing program 1: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000640)=0x2000) clone(0x2000e10c9fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KDENABIO(r1, 0x4b36) exit_group(0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000600)={0x0, 0x1, 0x1b, 0x11, 0x1f9, &(0x7f0000000200)="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"}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) r6 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TIOCGSOFTCAR(r6, 0x5419, &(0x7f0000000680)) setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$vim2m_VIDIOC_STREAMON(r5, 0x40045612, &(0x7f0000000000)=0x2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:38 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000010000108fcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000008000008000400", @ANYRES32=r4, @ANYBLOB="08001b0000000000d0165351f4eb8e84ab3f9169e028470bc6ce8f391904481c8bf9827b95550000d317d10700414c6ae9d00bbe9ecead8edaed2b4abde57dafed614e3ed279827e2fbb4cc541a0d7a0381fca2f39d9d2e0c6bbce003f93fd02f849f1f5f42a7424e3c7fc76fd08b9d2519663367c7f880d2e9e3b3455b2873b4fbb09a105737b20b9955b3c720df668561f349cb50952ee6887ca80b5d40ed370bc42013bcf975e5ade9a9676bfc78d14bd619c88485129b67ee2b43d38c1b61a92fb5060ddc4060b257a2c05a007571639eb2f5247e4bf70400e66b7436648fb985d30109c512c514a95000000ee582d1df06223650000"], 0x30}}, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000240)={@private2, r4}, 0x14) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_ATOMIC(r1, 0xc03864bc, &(0x7f0000000200)={0x101, 0x6, &(0x7f0000000040)=[0x3, 0xffff, 0x7fffffff, 0x7, 0x2, 0x4], &(0x7f0000000100)=[0x7fffffff, 0x754], &(0x7f0000000140)=[0x6, 0xff, 0x60c, 0x2, 0x0, 0x0, 0x713, 0xa, 0x5], &(0x7f00000001c0)=[0x7, 0x20, 0x7, 0xfffffa81, 0x4, 0x800], 0x0, 0xb90f}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x3}], 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) [ 862.437950] XFS (loop0): SB sanity check failed [ 862.453252] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 862.496507] XFS (loop0): Unmount and run xfs_repair [ 862.513399] XFS (loop0): First 64 bytes of corrupted metadata buffer: [ 862.529013] ffff888216168000: 58 46 53 42 00 00 10 00 00 00 17 00 00 00 10 00 XFSB............ [ 862.541040] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 862.548551] ffff888216168010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 862.563490] ffff888216168020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 862.574400] XFS (loop5): SB sanity check failed [ 862.578831] ffff888216168030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 862.591203] XFS (loop0): SB validate failed with error -117. [ 862.594529] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 862.600075] XFS (loop4): Mounting V4 Filesystem 01:47:38 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x1000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) r7 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x387002) ioctl$SNDRV_PCM_IOCTL_REWIND(r7, 0x40084146, &(0x7f0000000140)=0x1) kcmp(r3, r5, 0x6, r6, r0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 862.644163] attempt to access beyond end of device [ 862.659285] loop4: rw=4096, want=131073, limit=131071 01:47:38 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 862.697545] XFS (loop5): Unmount and run xfs_repair [ 862.719197] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 862.720257] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 862.757589] ffff88821ad2a000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 862.781108] XFS (loop4): empty log check failed [ 862.795912] XFS (loop4): log mount/recovery failed: error -5 [ 862.799348] ffff88821ad2a010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 862.810842] XFS (loop4): log mount failed [ 862.836157] ffff88821ad2a020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 862.863378] XFS (loop0): Mounting V4 Filesystem [ 862.906313] XFS (loop0): totally zeroed log 01:47:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 862.932645] XFS (loop0): failed to read root inode [ 862.946899] ffff88821ad2a030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:38 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x531002, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) 01:47:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'team_slave_1\x00'}) [ 863.003083] XFS (loop3): Mounting V4 Filesystem [ 863.009594] XFS (loop5): SB validate failed with error -117. [ 863.017537] XFS (loop3): totally zeroed log 01:47:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0xed, 0xfffc}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 863.084623] XFS (loop3): failed to read root inode 01:47:39 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x531002, 0x0) 01:47:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/keys\x00', 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r1, r3, 0x0, r4}, 0x10) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SIOCRSGL2CALL(r6, 0x89e5, &(0x7f0000000000)=@bcast) 01:47:39 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 863.305150] XFS (loop0): Mounting V4 Filesystem [ 863.319737] XFS (loop0): totally zeroed log [ 863.358248] XFS (loop0): failed to read root inode [ 863.370624] XFS (loop4): Mounting V4 Filesystem [ 863.381796] attempt to access beyond end of device [ 863.391892] loop4: rw=4096, want=131073, limit=131071 [ 863.397207] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 01:47:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x9, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x40000) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendto$netrom(r3, &(0x7f0000000180)="5ef68a20bc8658203a52730a21f243f4e9e671dc10ba6d8a1c1c63359e9340d493949a3a8886ecb6d2646c2cc5195860422d5dcd57d5f7566ef5741a4b0bc8ab3bbb9217e461117047ac64ffc3d90876164574668de6ae323538256db91a006e19f9f3436fb84b1e39ce0e6172a11e6fc8e30c09584decb4f766f16efb84d46240e80a2fb032675adc825123b4079efa906c724d95a7b1094bf626dafb6943100134207215ece72437e42b4cd6852d3f522751f58792177e34973ed3aba773d4ec950d593a47111a178bde721767ecb3f9765fe4530f7f5a7f41b6adfcd7ac4f4ef8978a78f585e7ed73a92971399d446babd7970aa1f98c23957d9a78551461bc0861d37e6635f9a7317a57e08bf2352c27f2e8cf06018c850266cc2d3c8c5bf9b68630e3568cffc54310d784d44ae37ff81ab9830b8f3d2661d796ab60c0008b1de55c35d8391757914b3c601c458b03eb5043d6cbe1de8675ebcb4a18e4c11af9b2d51901aab95414ef54a79cf0bfeedef11e0c4b9342f02fc4668376fee681cfe3b7d33fd51db817f3e4abaa7b44ef34617eb2aa82d260bf64031c345d302b93dd037630dd83622f99f8b4c2a52cb72e8831020a89cdbf0d9ddcccfddb861f21f6d6282a2d3715e150b73b9300dfb2fd379ace926d0f47e861844f69299abc68dd48f23b962f0cff531ead24a3f8285b0e3f2dfdd33997aedfd661517065dee74c8e22db576bac5977217feb3603b437c907d685b5bc0462d558cf0fb9d5689bc4d7a3ca8ee45f4c75011bf2aad34ebda73aaa53a6f74380f16a15d94f63f5444342c39dc4b2df44cd58babb811cf0a18267791b82d381004c4077e3dda4818e0c0dca2fec1b31fa800dbd8e0dcea78bd6c28f868cc7d6b8498de7e770835389197aa4f90266a75c5c8a7fdbd74014de9c3b8dcb9643132d323fef7356b600824c45e0c31aca7ec5be27dd24aa7475a0f96ae9246313bb889d5313b430be26ab72f8e94e29c29ccd6f0f7dea6da4692c2a4e2414df249d07504c3b0ff641c7bc2ce8cc36ed4a91980c158bed64b9062fb573f0a444e12533d94e88f035a42c48cd232c15210b1dc2fab55c8f90c28c30dcd3203a5a8c02eb2c22c8f2c02399c290034fe8a0cc48e2d4ecc0bbc3b34cc88018e622240e2515f972d9c742f8cce6481f2f303a936beca962a3b31dbb0eccdc4ee3bc2ae8475cdf46aecf1d3e24517401ceaf142a05fb572ccb6a180acb7377dc13ccbb711d97c6ad494ae906842dbbb9191c86510ae68fce6231cbf07c6e429c85333628c77ff207ea40db625efa3bd213c6e2edd45e69925b34fe5aa250c62310c1a2a13f6a900840c2e5c56d2775126c93deb728aadc44f003741f9d17ca7f447d9119f26034f2867cd1ee734de3fe8dfa32973c91ebfbf7b754e675283bdf924f084d09f69c2849e91d8f4ce4322ba4ce27a711bf2b8e112d1dedd3b57ad02eb5e3e118ba9fc7b33715afe4820605fd4d726f6d52a368b6c8d17220d05c5f96bdf7e7b5a9662356e956801b2a1172537d51310e7934a7967dc06a53da26761d0369d2414bc20bb31418fca25a5bff293b27d741bf7e5e31e4d3d175ed594b86836c188cda54273c854081a68f4b1aa7a2b11bbe9399e2a0f31d37c42c68660cbf14c9d2fb50a5a8b195c135c0b0053a4ae6166c95d8adc26c5ccc04e061b5ed969963ed209ee17639d87fe8af5d9152fdddd39bc0784d964d908d5144ea0598f85bb4707237c32c6087c8a8b6916e7846e338764eebb3ce5dbde6cd108871ca243d46c56fd1db6e4e6d5469c16e1ba3ac198712c81e7a4cf45e932f464f1c5007e2e32fae123e4342eb439846ad631e57787faf87ca1cb220dc7fdb0ed12b1adc720f77bd9fdf77ac09982f4db9299584078980c1bff211baa35db0d19d0217975f7664e8c8bc97cb21edb321fd528b3f0e87943c001e9a44d6a42c7f2d7b3a84c829c36ee14650f2086c9306f1a9342750b5fb60c715e3ff388c4a26a8313ccbb0d631b70572a9e2ecea1d0d4b9897475380b67c5ef458c66ca48e110e94c165322e734bdb867ddfab801e79e12f6402c09f5f454d6a4c8e43a4f3608b715e0e6efb6b626dc197805415ba0dfd04211f4a659bff409af5f8500336ea5317a2af6eaab76955d6f4a9c01be008e39b37ac1112a42f022d106ca810a530e57fdc464d59f1a3d15e3c32b9ccbba558bbb02ebf0a8d0bf30241b761895b62c6f1e1af716ae0e37a5199840f50ccbf0d5f254c74afa162b99796cc937fc16a2c4b789dd2107f1de908dc2f4af041e3fd41d03f3e70359076d9e9b5b9f5a22df12c086f2127423404b456b0f4bb2733842bc9acf4357c67d6970f2265283def6588662b0e055f61841dfe398053b65b99fbaf8efdbe50655f9cef6a4d3fc44383689b011995cb7987110970c20ffee91138d0e93d74edf1a90d6b50b1206e77c468b3d11a4d79b36d89ef8d0fea333e7a32130f2a2c8e04440eb5b5b81841237409c435e91c61eca5e94b8ab986c3e6f08e6188c5da3f8f1718425076c5fb42bed032d110ff3243107866e9eb91bf03c1387cba1ae91969f067abcdbf0b10a6aaf1b40be32f7cc5cf2063c9800a3fedd13e37c4e8e7b9cb9748af566adc605431d8836392391e723d27e50420fc413086d0f89225e5d99d9736fd3ac2793690ff4d49b2226d1f48ceb91bd5f8523c50900f8381eed0af0d50b6d5332fd0caf85f9e073bbc6bf31c464e4419bb9575f618fb0c6db48fc61e5495d8a2963025545db1930e0462a61822f66811570060c2960fa8aa88aed1cc972256e015ee8e2c654bbc981201e3ce38faff73bd44266020f98f048615ad41c85089271a5a10dc70b7fec4e65ce49477eef0a19fd5268cbb0b5117b69f99bfe1feafb82e4797d27bb1f494b638251a1594f8edd1943fdc7123d3f2706f457fad5d07aa8ddef14b751f46eab5854c872b88e8ffe27a180daacb10fe707e2fbd5fc518b4ccb6f5930473eda66f9f510ea18bf270714be543f0688495753768219f4e948e15c62c26af631645eb1788aafbd468b6067d1f8f4caf7c08bdb079134b10717d5e54b4024272bff4ebceb4295eea3ae483fb90d75784eb7ceb5dceacb3dd1ad8987d00a2429199de7e34acb02730c42293d71422962ef0d17e3af21df10cab2107fa2d52ef9f7ec9d1cbe2d680eed24a9b3c2213582ef7b1cd8f68ba66471d649bfb348ce886249e09e577325ec789097bd0b5aad71f45fc8236c2433067583de16419a9f5560c6bac811820d0ea6e71c82d31a90a4b9a3208a429cf2880e4a90e3f0b044525f4ed3fea23b2099dea1794c11d6c7d882f711744899095e03da017249d8c176e01f91bd26ad5a6ab4fd23a909de52266fcb380ae2f6827e3dc68356c8da31423399594a87b79990637801fd5c9ee5e2c1d312f05807812a6a228c21624c98000bb5f3839754933aed9f1879e4186407a36a7dca4994c710d40a5c0e450c1afdbe87eb60ad00cd498e23bd5daad86733a23bec457d244e6246a879cc968136fdfe0133f9e83c1d70de2a473434abe6172206d9a81d8338d5521021b653581b2606ab31cc1abaf08ab61d8f911f14d87f5f4d92ed004cbc8376a1f3aa125135b6a2d4a5e294ee43a9878b03e4227b0b99e01951a7e4db04327ca8460575a96f5c7e4ad33eb7362ca27f4a2ee359f2cfdd4297b03ed2bec0292c50471a59d8d237c4c15cdfbd8017f8682dd763eb158986886b798b4914bd355647e19d263199717fab3eba6c945fc20d1adfc7449ffc6e715aa04da2828d6a0b0c45f11203e0ea516d3b67b8cac01faa684a3da23ce9491fe2cde68f6d50e4b63a6a87c3246fa2e20a5472db33ad8647db1f0a627412934705db51e2b705a6926f70101015ce989800ed54c01cd184fdb7005bb58b5c3ece89dc3b9b1ced2488a41f828458d3021670c3b4faa371dc839a5feab3d8d069ddc5611eb6e5e8c2284fa55f9b334de20d4720eda802bfc8c5afdf74ec3bb414b3cac85514740f1e5b980aa6b94164f3867d361fc54cd9f167265c0836ab3c5ed78b23c9ca6d9aae78b8f9d22c187b3217333617b208ab48b9b41d5265074ad6978cf4b8f3e0868d8c464418fe8a7afa5d43239b1d5623641c72cac4b7c6d64324a02571576f1c6e1cadfec08798e24bbd55594288c31c6c1b845857c7e9ec73d172e17400c218d3e9bbea940673a3d968a1afe493d9d805d1e9d37466155acf6e2a0547796db1eb4ccb31d7d493c6463c905063198c47691e946cccbf05f8806baaf1356c51374ba779d862984d9b57e4b20d73902e57dac3a11df3aae860766c944b0d59b1c445d6dfa894f6ced68ee1b9260e2f742f76e5e59d4037f266e01de98c9e01f67506614f7c76062339a225f7c4b08131e4dd38a2cc4f52af6896fa502543a30e123c0188dcbf6041c1330a19573e84bae850bc085a18f70487ca7fba1046547e8c11eabd5e2fa3aabdfdbb3d7f99a7479a0e18802a66940a145b03beeb18661188900c6288306e2713548df7deeca774019ba83b8148c3576634e36d943bf148fc38bc529eb220aa21a1452e429ef418ca8101b11fc5a99ffa3c44d23ce8f9510f2e4dc37709a5ff96da6aace471dbc92fbef62c928677c10247a0dcedf2e5a6f6527554858ec0afe059fd9712ba002c60e1a3f1a78aaf8196ab4ab2a88ce0e1031e053e38e1281a9b5280c107164107480c20f5ea0b1909621d84cd1b18b5252ab1e665f5bd65f69b0ef10b3e4cbae38b62bd619b31f15251f82c02235fcd7e567d814835509825b17f07be151ff714ea95c66163808830ab9ef86b280e146d8d10905167f54c34e69501a097c859143751c1ba324a5b57bf71c88382940da665f5961326e3b7f8fdaad849ceb0654002efb6686abedb9a85eadfa1c1a94a42228a54a20dbd614e898d78298556349c81b5fcc9a503b97b70b93e49e7468f8aa646c745da1e40149a577f786d4a3f1cb52ba108883ec08c32bb7a902e4bd0f8273c5cf4fd1a1f6a1ccfad0a2f66c6020301d6ddbc4d68bd13b1ccdf1b138c29005a9d8e95bdfe535aff5cea974c66b8e6e4f7e8a29f0682d9f97c9608708402e294c752cdbeaedf5f9ebde52024a4fc9e39564322a4b36e86f6b9f240aaadf22f22ec85d4237f9cba46ba3975b38e25492a2eaf4be03908ac2e0342cb7ed1bb6ac1757ef65a5f5ebf9d582e79578243e462f63da19fe7b325047e9e4ea9bece1a98913e20386d8509d5698d3413c5f2839e9862527983108ff80afd8d71be877c14788317caf0acdd8ff436e0465432a2de92aebaf4b1e9190937886fe9c4c0be6c635af958ae67792be6add38e9e1988bed6e1bc7e18547fae065a80d36bb7bcc18e2948f655d3d0c0b3597cc5cfe283df77ee4db06175af003d313610afb24acf64659fdcf78a5e68e01f7e1f3c46aa021bad443f5df88f9fd189c3809d65e734a87ee2588e9d5d44a66107e449a3c1e8b159e9458fb127007b9bd815cb9b5f039ddbd1f35493b8849ddcac40c70ed3d324841083a51637f50952c656a481335e58578073fad46b2cef1a691c7619c78bb75f8a0f63b17c446a73372e7cad05cac8fbeb079682c2160fbcdaf98d3a20d80a2c60219acf8d35d78ced01822c6004e6cdb2faaf348f97b6100d7486a92d4275dc13a00bac4bd5fb2c3504b3d143433ffa940739a88e2ab9df40b90dfc128026a59554b05dd931bf7931e134f40f2ed1fdc56477060f47e7d51ae6237ea76329f8d8249", 0x1000, 0x0, 0x0, 0x0) [ 863.417295] XFS (loop4): empty log check failed [ 863.431978] XFS (loop4): log mount/recovery failed: error -5 [ 863.439072] XFS (loop4): log mount failed [ 863.444296] XFS (loop3): Mounting V4 Filesystem [ 863.461915] XFS (loop3): totally zeroed log [ 863.478764] XFS (loop3): failed to read root inode 01:47:39 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x531002, 0x0) 01:47:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 863.530936] XFS (loop5): SB sanity check failed [ 863.537099] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 863.584629] XFS (loop0): Mounting V4 Filesystem [ 863.594934] XFS (loop0): AIL initialisation failed: error -12 [ 863.618233] XFS (loop5): Unmount and run xfs_repair [ 863.627652] XFS (loop0): log mount failed 01:47:39 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_STATUS64(r1, 0x80984120, &(0x7f0000000100)) [ 863.642748] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 863.668325] ffff88809be69000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 863.685870] XFS (loop4): Mounting V4 Filesystem 01:47:39 executing program 0: clone(0x20002800efc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 863.706259] ffff88809be69010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 863.713996] attempt to access beyond end of device [ 863.739027] loop4: rw=4096, want=131073, limit=131071 [ 863.743107] ffff88809be69020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 863.762826] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 863.797567] ffff88809be69030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xe, 0xc, 0x6, 0x13, 0x4, 0x80, 0x2, 0x141}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000240)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0xfffffffffffffffd}, {0x0, 0x0, 0x9}, {&(0x7f00000000c0)="f9d6cdbb98874232575646b9ab714ae18ef1aada7870438e72b880262874c763cca97fe751e1ee7c2bad1a6c6f47ab3afbd1319aa8171d14dc02a68ab75816c53edcfa74f4d88fa88e98d0385aac5aebac8e2dd76896c14f773d385f4a6b32d25a7431ad1f32d59f59cf5fe94391bcbcaa77f0795ebebbb39b2335d901fc264a9981029ef4b1c5f3468f7c92", 0x8c, 0x3ff}], 0x0, 0x0) [ 863.811646] XFS (loop4): empty log check failed [ 863.828574] XFS (loop3): Mounting V4 Filesystem [ 863.837713] XFS (loop5): SB validate failed with error -117. [ 863.847529] XFS (loop4): log mount/recovery failed: error -5 [ 863.854463] XFS (loop3): totally zeroed log [ 863.870297] XFS (loop3): failed to read root inode [ 863.885836] XFS (loop4): log mount failed 01:47:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0xffffffffffffffa1, 0xd5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0x0, 0x6, 0x8, r3, 0x0, &(0x7f0000000040)={0x990a6c, 0x40, [], @p_u32=&(0x7f0000000000)=0x1}}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r3, 0x80585414, &(0x7f0000000140)) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000240)={0x1, 0x0, &(0x7f0000000200)=[0x0]}) r5 = socket$inet6(0xa, 0x2, 0x0) dup(r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000280)={&(0x7f00000001c0)=[0xffff, 0x4b, 0x6, 0x5b], 0x4, 0x0, r4, r5}) 01:47:39 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x531002, 0x0) 01:47:39 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 864.010757] XFS (loop0): Invalid superblock magic number 01:47:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={r3}, &(0x7f0000000040)=0x8) 01:47:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe7b330db73"], &(0x7f0000000080)=0x2c) ioctl$SIOCRSGL2CALL(r3, 0x89e5, &(0x7f0000000000)) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 864.120855] XFS (loop3): Mounting V4 Filesystem [ 864.137804] XFS (loop0): Invalid superblock magic number [ 864.170230] XFS (loop3): totally zeroed log [ 864.185789] XFS (loop4): Mounting V4 Filesystem [ 864.205717] XFS (loop3): failed to read root inode [ 864.217834] attempt to access beyond end of device 01:47:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff7d, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 864.241916] loop4: rw=4096, want=131073, limit=131071 [ 864.267931] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 864.302639] XFS (loop5): SB sanity check failed 01:47:40 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 864.315590] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 864.356296] XFS (loop4): empty log check failed [ 864.363414] XFS (loop5): Unmount and run xfs_repair [ 864.396445] XFS (loop4): log mount/recovery failed: error -5 [ 864.403713] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 864.416625] XFS (loop4): log mount failed [ 864.424395] ffff888085d7c000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 864.436512] XFS (loop0): Invalid superblock magic number [ 864.444885] ffff888085d7c010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 864.465415] ffff888085d7c020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 864.486299] XFS (loop3): Mounting V4 Filesystem 01:47:40 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 864.494377] ffff888085d7c030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 864.544024] XFS (loop5): SB validate failed with error -117. [ 864.544177] XFS (loop3): totally zeroed log [ 864.617621] XFS (loop3): failed to read root inode 01:47:40 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 864.728804] XFS (loop4): Mounting V4 Filesystem [ 864.773356] attempt to access beyond end of device 01:47:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000040)='*\':\x00', &(0x7f00000000c0)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:40 executing program 5: exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 864.811916] loop4: rw=4096, want=131073, limit=131071 [ 864.845562] XFS (loop3): Mounting V4 Filesystem [ 864.854579] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 864.869133] XFS (loop3): totally zeroed log [ 864.881126] XFS (loop3): failed to read root inode [ 864.888304] XFS (loop4): empty log check failed [ 864.899566] XFS (loop4): log mount/recovery failed: error -5 [ 864.956918] XFS (loop4): log mount failed 01:47:40 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:40 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 865.040217] XFS (loop0): Mounting V4 Filesystem [ 865.058226] XFS (loop0): totally zeroed log [ 865.095002] XFS (loop0): failed to read root inode [ 865.156132] XFS (loop4): Mounting V4 Filesystem 01:47:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x6, 0x8001, 0x0, 0x2, 0xffffffff, 0x2, 0x7, 0x8, 0x8001, 0x3ff, 0x1, 0x8, 0x400, 0xbfaa, 0x1, 0x22, {0x200, 0x9}, 0x9, 0x40}}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x4008, 0x0) [ 865.203225] attempt to access beyond end of device [ 865.208317] loop4: rw=4096, want=131073, limit=131071 [ 865.218519] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 865.247292] XFS (loop4): empty log check failed [ 865.262825] XFS (loop3): Mounting V4 Filesystem [ 865.270994] XFS (loop3): totally zeroed log [ 865.289022] XFS (loop4): log mount/recovery failed: error -5 [ 865.299462] XFS (loop3): failed to read root inode [ 865.314124] XFS (loop4): log mount failed 01:47:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x3c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r2, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010100}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x74e}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @broadcast}, 0x10) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:41 executing program 3: exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:41 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:41 executing program 3: exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 865.483312] XFS (loop0): Mounting V4 Filesystem [ 865.512280] XFS (loop0): totally zeroed log [ 865.528047] XFS (loop0): failed to read root inode 01:47:41 executing program 3: exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:41 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 865.654376] XFS (loop4): Mounting V4 Filesystem [ 865.670125] attempt to access beyond end of device [ 865.699428] loop4: rw=4096, want=131073, limit=131071 01:47:41 executing program 2: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x41005, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000000)={{0x3, 0x3, 0x5, 0x3, 0x4}, 0x80000001, 0x9cf}) [ 865.727109] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 865.763348] XFS (loop4): empty log check failed 01:47:41 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 865.783820] XFS (loop4): log mount/recovery failed: error -5 [ 865.798368] XFS (loop4): log mount failed 01:47:41 executing program 0: clone(0x80, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x44800, 0x0) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x300c1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r3, 0x51}, &(0x7f0000000380)=0x8) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x3, &(0x7f00000002c0)=[{&(0x7f00000001c0)="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", 0xff}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f0000000140)="049bfcae665427784d8a92fb74041403268c6fce0822e3e6959c13aa987f9776988b99dee2f2b813cc11f07965", 0x2d, 0x6}], 0x0, 0x0) 01:47:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x80000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xac, 0x3, 0x8, 0x301, 0x0, 0x0, {0x1, 0x0, 0x7}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8906}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x60}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xffffffe1}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x500000}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3cd}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x4}]}, 0xac}, 0x1, 0x0, 0x0, 0x24008045}, 0x48080) exit_group(0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f00000000c0)={0x0, 0x80}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:41 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:41 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xffffffff) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:41 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 866.094745] XFS (loop0): Mounting V4 Filesystem [ 866.107249] XFS (loop0): totally zeroed log [ 866.120300] XFS (loop0): failed to read root inode [ 866.128638] XFS (loop4): Mounting V4 Filesystem 01:47:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x5, 0x200, 0x5]}) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x288c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, r3, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 866.141515] attempt to access beyond end of device [ 866.169776] loop4: rw=4096, want=131073, limit=131071 [ 866.198615] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 01:47:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="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", 0x1000) r3 = dup(r0) ioctl$VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000140)={0x1, 0x7, 0x0, "e5d6668eb31ab358b5cbfb40e6ffb50905040dc03c37a803a39e627691485131", 0x31303553}) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000100)={0xfff}, 0x4) shmget(0x0, 0x2000, 0x400, &(0x7f0000ffd000/0x2000)=nil) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x60400, 0x0) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000040)) [ 866.242925] XFS (loop4): empty log check failed 01:47:42 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 866.265161] XFS (loop4): log mount/recovery failed: error -5 [ 866.299307] XFS (loop4): log mount failed 01:47:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x0, 0x2e0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000020000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000440)={0xa30000, 0x0, 0x8000, 0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x9a0916, 0x3f, [], @string=&(0x7f00000003c0)=0x1}}) mount$9p_xen(&(0x7f0000000240)='syz\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x2000000, &(0x7f0000000300)={'trans=xen,', {[{@cache_fscache='cache=fscache'}, {@access_client='access=client'}, {@nodevmap='nodevmap'}, {@nodevmap='nodevmap'}, {@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@posixacl='posixacl'}, {@aname={'aname', 0x3d, '^.\\:'}}, {@version_u='version=9p2000.u'}], [{@obj_role={'obj_role', 0x3d, '\xe5\\@/*,,!!}(\\'}}]}}) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x107240, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x4, 0x3, 0xff, 0x0, 0x0, 0x7a, 0x1010, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x80, 0x9, 0x3, 0x5, 0x1, 0x40, 0x1}, r5, 0x9, r6, 0x3) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000180)={'raw\x00'}, &(0x7f0000000200)=0x54) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f0000000480)={0xfffffffa, 0x2, 0x9, 0x101, 0x800, 0xfffffffd, 0x3}) 01:47:42 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:42 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x6, 0x1b1002) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r3, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=""/47, 0x2f}}, 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="edf929db", @ANYRES16=r6, @ANYBLOB="000429bd7000fddbdf250100000014001f002001000000000000000000000000000106000e00362d000006001c006c0000000c001000ffff000000000000050014003f00000005001200ff000000050007000300000014000800626f6e645f736c6176655f30000000000c001600fbffffffffffffff14002000ff010000000000000000000000000001"], 0x90}}, 0x0) mq_getsetattr(r1, &(0x7f0000000040)={0x2, 0x9, 0x5, 0xc54d}, &(0x7f00000000c0)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:42 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x47, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0x10}, 0x14013, 0xf59, 0x0, 0x0, 0x0, 0x0, 0x84}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) getpgid(r1) mbind(&(0x7f000040a000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3, 0x4) r2 = socket$inet6(0xa, 0x2, 0xfffffffd) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x90000, 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000000)) 01:47:42 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:42 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 866.685510] XFS (loop0): Mounting V4 Filesystem 01:47:42 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 866.735015] XFS (loop0): totally zeroed log [ 866.739910] XFS (loop0): failed to read root inode 01:47:42 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@un=@abs, &(0x7f0000000100)=0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@gettfilter={0x34, 0x2e, 0x1, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xf}, {0x0, 0x2}, {0x5, 0x801a}}, [{0x8, 0xb, 0x1}, {0x8, 0xb, 0xfffffffd}]}, 0x34}, 0x1, 0x0, 0x0, 0x44001}, 0x850) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000ad00d35700000000000000000000000000000000000000000004000000"], &(0x7f0000000080)=0x2c) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r5, 0x800442d4, &(0x7f0000000380)=0xffffff19) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000180)='[\x00', &(0x7f00000001c0)=',:-\x00', &(0x7f0000000200)='ramfs\x00', &(0x7f0000000240)='\x90,()\x00'], &(0x7f0000000480)=[&(0x7f00000002c0)='ramfs\x00', &(0x7f0000000300)='ramfs\x00', &(0x7f0000000340)='ramfs\x00', &(0x7f00000004c0)='ramfs\x00T\xb6I\x94%t\xb5\xcc\xbd7\x99\xb3\xe5\xd5 \xe5\xa6(\xb7\xcf?\x87\x80-\xe6.\x05\xf2\xf5\xc0\x1f\xc5>\x82\x99\xbb\a\xf6K\xca\x00#\x8a\x1b\xeb\xa4\x03\\Z\x95\xab~\xf3\t\x97\xb20*=j\xb6\x10\xef!>`hL\xd0+\n,/\xfa\xc7d\xd1\xa55\x81\x03', &(0x7f00000003c0)='ramfs\x00', &(0x7f0000000400)='ramfs\x00', &(0x7f0000000440)='}\x00']) 01:47:42 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 866.873803] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 01:47:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040), 0x4) exit_group(0x2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:42 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:47:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x1, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) accept4$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80000) 01:47:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 867.212895] XFS (loop0): Mounting V4 Filesystem [ 867.231819] XFS (loop0): totally zeroed log [ 867.236586] XFS (loop3): Invalid superblock magic number [ 867.260841] XFS (loop0): failed to read root inode 01:47:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:43 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:47:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaac13, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 867.482325] XFS (loop3): Invalid superblock magic number 01:47:43 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:47:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 867.797302] XFS (loop3): Invalid superblock magic number 01:47:43 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 868.057084] XFS (loop3): Invalid superblock magic number 01:47:44 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000200)=0x3) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180)='mptcp_pm\x00') dup(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x6c, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1a}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xf7}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010101}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, [], 0x20}}]}]}, 0x6c}}, 0x1) remap_file_pages(&(0x7f000040b000/0x4000)=nil, 0x4000, 0x1000004, 0x8, 0x20) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="10002abd7000fddbdf2506000000040001802800018014000400fe880000008000000000000000000101060001000a000000060005004e210000"], 0x40}, 0x1, 0x0, 0x0, 0x404c800}, 0x4000004) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x20004880}, 0x40) 01:47:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, 0x0, 0x8000, 0x0) 01:47:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, 0x0, 0x8000, 0x0) [ 868.374170] XFS (loop3): Invalid superblock magic number 01:47:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e20, 0x7a, @local, 0x41d1de4a}}, [0xff, 0x6, 0x3ff, 0x3, 0x1, 0x1f, 0x7, 0x6, 0x6, 0x6ef, 0x100000000, 0x97ed, 0x80, 0x1f, 0x8000]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e23, 0x10000, @private1={0xfc, 0x1, [], 0x1}, 0x92}}}, &(0x7f00000002c0)=0x84) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:44 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 868.606197] XFS (loop0): Mounting V4 Filesystem 01:47:44 executing program 1: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x7, &(0x7f0000000140)=[{}, {}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000200)={r1, 0x3}) exit_group(0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000840)=[@in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e23, @local}], 0x20) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000880)={'filter\x00', 0x7e, "aa63cfe7353da96ad0bf2fd1361bfe2c46c23060d1a1c2e7ec5eb4baaf2338104cdf43d79886b095360ec2feec1d5a43ce670bd4c823888be4c5201b8e2afc205ead9ce0fab8cc257dc17b3f2fa73a953e7e5b4d7e1e0b9e282acb284a84ecc11f440c59d8391fa74fe62f5c5edc589d9f0fde531961b64094f96ef03cb1"}, &(0x7f0000000080)=0xa2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000800)={&(0x7f0000000080), 0xc, &(0x7f00000007c0)={&(0x7f0000000280)={0x504, 0x13, 0x300, 0x70bd2d, 0x25dfdbfb, {0x4, 0x0, 0xc7, 0x2, {0x4e20, 0x4e23, [0xfffffff7, 0x6, 0xf492, 0x6], [0xd2c, 0x7fffffff, 0xffff, 0x80], r6, [0x3ff, 0x2]}, 0x400, 0x216}, [@INET_DIAG_REQ_BYTECODE={0x4b, 0x1, "74a71eb08b4cfba29d96cb0d2624dfff415cbcfa06021d8cc2f0cd123d5aea0102f0faf36b2288f3adc7c0ab3107d8386b3d1a840f7ce6d7cc12c31a8e4833135a0ec9100f6a14"}, @INET_DIAG_REQ_BYTECODE={0xf7, 0x1, "51cf875c57e5885ec0af74947ff65fbae60d50adab9530e8fda3ca44efcf8bdf456f8a6562f586f5a1c8631477bfda1eac87c1ed8995a5b541d3b02fdee1d5ce0d8180fbdbaee968e83b7cf480669ed1ebcb2f750fa83094dc4b330f4536624813063a4c42c3ba361ba62cb8281be1a4734bfffa0dbaa2a38db2af291819763ade8c7a301ae378e1d68bbd81373ed199749f3480ffaed173bd1586e3312ca6419543e1a14dfdfa0c9b63403d698eb8a2cb7f24285e32ab1a7c61c90b87ce4bb29f85ba169180b65e855fa20d4cc8594f7c65274878b6ea9e3bd728bb7ac85aa7a7427767883f395a626252db7f48a377e2a75c"}, @INET_DIAG_REQ_BYTECODE={0x5e, 0x1, "6d021f2b1c32a42b8bfae23dc6ab9e69357fbb80c75f0ba0a1322769b347cf56b18359f00ce9e2bce84d23f7b9cdc951c99e32fda8535f1c46c753274269d5bfbfd3820a007c2d6b24f844f0d4fa7fc35cb879236a3dfbf7bbd0"}, @INET_DIAG_REQ_BYTECODE={0xc, 0x1, "7e2daf4bf8e83d11"}, @INET_DIAG_REQ_BYTECODE={0x80, 0x1, "9f9ecddb7115f82e5c4c6bd2f7b9ef45a5d2153456cfd07babe2fef248f0191a6e42638f6c63e764476ee5139916f97147e3cf820411cc188e13f985e79bf8791adb38d645ced77e59eb8db132ba4b8a3c87eaa66c3bf400f2776004877a4cf90f107979b6b3fd99eeff06086fc878be189ee4a92832d0428b617051"}, @INET_DIAG_REQ_BYTECODE={0xec, 0x1, "7a359ff849a227d381fe349af86c20395a45aec8516476a8bc33d70cf20a4620a5c9b4aebadef3667200a200ed52f89a0bd316868eee84eba0e38fe463b94aede3747427034943ccbdeb3e1eea24ef52447765f3a9d95a3855b2056dab51e5bb978ce645258fc4607f7f070e00e46494d816c4c31a5e8fca7e17281384a08db97d13ada5aab3cf4a627a184bcc7679436812cb41a1d774ccd7d135ec40e5e76d362aac15a9ef2733a4ec7cde95ce5c41f3936e4e39b572c9efe1ef47ff615a825fc3036ab09d045a436f948fcc8d56660e471b7b301f926026d9f3f67582a5e3b4a2ce881c99733e"}, @INET_DIAG_REQ_BYTECODE={0xf4, 0x1, "86c2c0a292d02a37787b7a372352415a94a35c66e1670369b62a95f051699ebdcff46f5d67cc9e8a386ab4234b32950408847997ae3c81f430f6cce4920ab80d86a7eab15183fa6c7e7921899222b74bd7573d191fdee0de6ae913e85b45ce02f521159eef3d82aaf1864425747d57458752a420f6ae9620bb0295432d7e7d70ac53bdb7b80378caba505b62bcceb99f4d991493978c2226fe30fda680dc5b53f73f3dd604b98f8d70b7978571d11895c742e29a10749501f4ba942af8775615a4a641b835ad92d65a4c2be9dc51d81492b9fa6cb6d88c34ad2e9a1ddc3114096ad8b00e0ffb53edaed1c7f80b220c6c"}, @INET_DIAG_REQ_BYTECODE={0x18, 0x1, "a98d6cfd321e93e33b1a54ba180a719f03c87b72"}, @INET_DIAG_REQ_BYTECODE={0x8f, 0x1, "32ea522d06793571a65d8f134d1cc4883e64266078ad80927dafb07c8c4ae2b89907cbb42c3e4af876c51be7dd97bcd28cf22ae6d3a33d746b90fa535edf03c71dff21a1654e1de96b848190520ae0cfeabc01654bf0206c40db3bceb6a657aeea6f57b49738e0a97e738479c06cea787ee19752e948120dc878366c501f89c391511d726672e16b312c50"}]}, 0x504}, 0x1, 0x0, 0x0, 0x80}, 0x4048800) [ 868.635439] XFS (loop3): Invalid superblock magic number [ 868.658477] XFS (loop0): totally zeroed log [ 868.666095] XFS (loop0): failed to read root inode 01:47:44 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0}], 0x0, 0x0) 01:47:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, 0x0, 0x8000, 0x0) 01:47:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002680)='/dev/sequencer2\x00', 0x2a40c0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x3c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000027c0)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002780)={&(0x7f0000002700)={0x48, r2, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5f}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x40) mount(0x0, 0x0, &(0x7f0000000040)='sockfs\x00', 0x100040, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:44 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0}], 0x0, 0x0) 01:47:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e20, 0xb415, @dev={0xfe, 0x80, [], 0x1e}, 0x800}}, 0x20, 0x86f8, 0x3ff, 0x101, 0x44, 0x100, 0x6}, &(0x7f0000000040)=0x9c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x501000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x7, @mcast2, 0xffff}, 0x1c) 01:47:44 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x0, &(0x7f00000000c0), 0x0, 0x0) [ 868.953283] XFS (loop0): Mounting V4 Filesystem [ 868.972608] XFS (loop0): totally zeroed log [ 868.986995] XFS (loop0): failed to read root inode 01:47:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0), 0x8000, 0x0) [ 869.071445] XFS (loop3): Invalid superblock magic number 01:47:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$RTC_VL_CLR(r1, 0x7014) 01:47:45 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x3}, 0x15020, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f00000006c0)=ANY=[@ANYBLOB="66b46987d4b2edf53efd6b4f73696c74657200000000000000000000000000000000000000000000000000000400008c0821cce1d8fb4c6fee9ee2fc3300a58867127ee283f188872406ba597077d103b9621d10402c881c932e8ff9a15757c6e284a6564217ceb14afd3013a25b5467c3148a3a7b7544871dc8a3243316296586aa77e62a7a786ec400"/149], &(0x7f0000000080)=0x2c) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000640)={0x0, 0x0, 0x15, 0xf, 0x38, &(0x7f0000000240)="6b215d2092f542d0826f24346ecc49e29de39fc17142b8b8859a3529f3c9033b47adf0f2b1f9f7b2297ec01b504d15af15e7f155d081e117d7cd8226e02f63195476b98997dd34b430c864ebf675076c441cdf92cd880ad8d4daef26529d7cd2e0678fe466cef03df2df1db42db1f84312b3059ba96a843c6408df7a0a613d5412d64e22bdb2c521bed39454bc774f88b1c419f292fd100695d558cacffd8ce66f3b462efac368612e44a1ec4d4afc60d4c946ae7546c73337e8b15c2aa931fcb8b0566e1adc07c82a4087270442cce5501530c2555509b056f427994233f6283d92579646d759d8f07903fa0c16528c1a270a7a98a9894d500c2ff7822ed7fde0b938f0cdd6fccb36e75d4c5ec1d49026f4db9edf2f80b6adaee2e8b694cab73742610a7fe8838bbc1428c80e2c0773ec3b68e34a2640842e88304dbee45667ceba23d0337690b45fafa5dafe76f76e7787a21680d5855f0ad96b2366e9cddcbe9caef2eedb9567b507b7f3cae0bba481d3e6500dc3e5092e47a02ba7f7b12f55223231d3fe24a741a54cc29fa979cef9c3e39e77c461e90c97119935372f3dbe56ba70ff479b0e7e85ecda53245cdf627b4ab8ac31e1f60412e1498b04f6d5cb7e72135788bcb4ba6592850b04655722e801ff6355a62ae4f25baec1acfb13d8cea4c022d6c2375b076da572b330627d270b7bcd43424c77d4cd1e7ac59e510b63555b58692b714cbf9a43e06060ab7a17ce5ced570e75c598170690fcea66ec067a34b3bca05d18ecd6ae41428da0d293cf2b10866ab75e3cd1e77b993fe4d5f5dd03d1096ad4be50437a721e7518047301ea8872f750a7e697b33ce3876390d5a7340cc3a507ce2e0ed9f0afcc6bc05d5e1f35a7941a02ea30aabccd1b025271c6984a04750f88ef63f178bca6c717477803b3b515fc75c3cb2cf103c3ce44b34d7b7bac7892b27183080f3da4745a9ee887f90a206fe86dab3e77d0f63d46f260b0879c6fd3d621c60ffa83480888d11a1c7edbc520bc9adf9de74959772e710abeb2287764fe794718251034add7f1c136be32dd570db4d23da2fe99a09ec355063f36a5709019c11b687626731b5112caa11f9d6259fd1cc4ec115c195cd086e939f51f38b64dbf1c495ce23a7b1dc8cf89bd6cf7523f8619e2386acb322a291502695f5a316137defecd26590ce06f75ac5a56bbe1ed48c5a8491b55d23c63cfc0843d2e370533f5751073ad586c7487638d7952b6b017c46eba6703ad2168dd08b932502f2ab33fd7c441073ebb5411be8b89a498b83c21d6cf2374813a18ac79436975ab1b9dcaa2e9713a56e7cacd50000b826b1d94eaf2dd1962110890d7638e72d5769f60751e337477112d436d746da69e1a764c6d06acb39d2bba02ee1ba28306c5085c7e476117533b120f8282131183fc0f137c50554ef3"}) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000086683629f40000000004004000a763cfe739f0252a592603833272af5334d29bb76e8b9d91b94eaecb5d6e57df3b1a1e1b611b79533e3859c107fe335246c265eade7ee20bdac68abb35ab6befda7919961d8520b39c102bd801dec5d906c6c69b737b6fee3aedd11095cd9cfdd0412307292bb691e83c08dcd1595d14276652d3f62a98cc46cf9c62e462e5d14997d4d06f88d45bdd41aa2a2d2c52b58e46d922aa42139eaad9a19c9aa3a7a1b16724202910aad8"], &(0x7f0000000080)=0x2c) write$FUSE_INTERRUPT(r2, &(0x7f0000000100)={0x10, 0x0, 0x8}, 0x10) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$sock_int(r6, 0x1, 0x13, &(0x7f0000000000), &(0x7f0000000140)=0x4) 01:47:45 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0}], 0x0, 0x0) 01:47:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="666985746572000000000000000000000000000000000000000017000000a523cfe7000000000000"], &(0x7f0000000080)=0x2c) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000000)=""/128, &(0x7f0000000100)=0x80) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="584653420000100000000000000010000000000000000000000000000004000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000002ac4eff60d880000000040000d894f00efb6305601e2a173000000000d8a130000010000100000000001000000000000035ab4240200040000040000000000000000d2f58a758ab90d12bea8dd820c9a4665e6ee17984f4be784", 0x98}], 0x0, 0x0) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x8, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x882) 01:47:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x200240, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r0, 0x4140, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:47:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x5, &(0x7f0000000100)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {&(0x7f0000000000)="9f3ce99b9b84599aca7044232c82d781d9ab8c652133f46798714d53568ca895b7e003284e3db000881e11c30095f7402be85e22cb8922f923fc7d79142e5fe34248d7", 0x43}, {&(0x7f00000001c0)="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", 0x1000, 0x2}, {&(0x7f00000011c0)="39fcd0342f8ad135811543933457620e7abf32c8f75c84a5891ce4d37e1515883a30a52470294204e08dffcaff856e38c435013edefb21e4ebbd618e805da014c50bdd3e3689c41dab014fdb5ba039264c19beaa2166cdbbd9dfdb5d99931819bc63dd4f645345cb0305b1dc9875deaba130511d4275c00b2410a9b176ce0576a06f8c666d4217a6e175e77e915e01d06f00e1d80326cb1585537b2c6af427ae60677790621971f316497c169ca7ed8edc7a7d9f233c304ccd4ff61bfdfb43aecf23905b283fb46bca604834fa56fbe00fcf5cdff04c16ac8696d9ff3e0b0c7b3adca839d99a25732739fbf753e0c406eb2d4f29d86cec0c0e6a50c95e8a", 0xfe, 0x8}, {&(0x7f00000012c0)="c500779e02d75abbc09609bceb1f76c35e5c6ff14f4ac5a941c8ea1a15d00e0bc1932d3fe6e62e139ca651cded64d6aca9017bf3f24ace2437aea4ad2f3dece899b633896adc7536ec26daaf4c8b7db6fc8cdfcf6196ec7ff95c9212d78ded3fb9845b55d348fc92df141e38f8d5dc30dd0e54aa96bc56bf8eef68539d1dc75a2a1ff50ef1c3f1b1004db98972faccd5053b0be920e91272dbf262ba2b1d7789cf215a496cf83b9999a8af8050cf60b2df3501884d17f6cec1ceeda362dbc063569ef05b3c6c5deb8d7c192446b296899a98454f209f040ab995f7dae802", 0xde, 0x1}], 0x0, 0x0) 01:47:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0), 0x8000, 0x0) [ 869.300706] XFS (loop0): Mounting V4 Filesystem [ 869.314655] XFS (loop0): totally zeroed log [ 869.329403] XFS (loop0): failed to read root inode [ 869.358851] XFS (loop3): Invalid superblock magic number 01:47:45 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x995, 0x0, &(0x7f00000000c0), 0x0, 0x0) 01:47:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000003fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x100000001}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x5, 0xfffffffa, 0x3464, 0x3, 0xc6d6}) creat(&(0x7f0000000000)='./file0\x00', 0x10e) 01:47:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0), 0x8000, 0x0) [ 869.618203] XFS (loop3): Invalid superblock magic number 01:47:45 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{0x0}], 0x8000, 0x0) [ 869.997450] XFS (loop3): Invalid superblock magic number 01:47:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{{0x3, 0x0, 0x1}, {0x3, 0x1, 0x1, 0x1}}, {{0x0, 0x1, 0x1}, {0x1, 0x1, 0x1}}, {{0x0, 0x1}, {0x1, 0x1, 0x1}}, {{0x1, 0x1, 0x1, 0x1}, {0x1, 0x1, 0x1}}, {{0x3, 0x1, 0x1, 0x1}, {0x3, 0x1}}, {{0x2}, {0x4, 0x1, 0x1}}, {{0x1, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x1}}, {{}, {0x0, 0x1, 0x1, 0x1}}, {{0x2, 0x1}, {0x2, 0x1, 0x0, 0x1}}], 0x48) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r2, r4, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r7}}]}) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r9}}]}) r10 = getgid() setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x1}, [{0x2, 0x2}, {0x2, 0x5}, {0x2, 0x6}, {0x2, 0x5}, {}, {}, {0x2, 0xb}, {0x2, 0x5, r4}], {0x4, 0x4}, [{0x8, 0x1, r5}, {0x8, 0x3, r7}, {0x8, 0x2, r9}, {0x8, 0x0, r10}], {0x10, 0x6}, {0x20, 0x3}}, 0x84, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:45 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{0x0}], 0x8000, 0x0) 01:47:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x204080c, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000040)={0x9e0000, 0x1, 0x1, r3, 0x0, &(0x7f0000000000)={0x990a76, 0x0, [], @value64=0x4}}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x500, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x14, r8, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r8, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x74a}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20020800}, 0x0) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000100)={0x2, r6}) 01:47:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{0x0}], 0x8000, 0x0) [ 870.315968] XFS (loop3): Invalid superblock magic number 01:47:46 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) 01:47:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ptrace$setopts(0x4206, r0, 0x800, 0x14) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r1 = socket$inet6(0xa, 0xa, 0xffffff) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f00000000c0)={0x4, 0x7fff, 0x0, 0x6, 0x4}) 01:47:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000340)={'filter\x00'}, &(0x7f00000003c0)=0x78) r3 = dup(r0) write$FUSE_IOCTL(r3, &(0x7f0000000300)={0x20, 0x0, 0x1, {0x40, 0x4, 0x1, 0x8}}, 0x20) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r5, 0x10f, 0x84, &(0x7f0000000400), &(0x7f0000000440)=0x4) write$UHID_INPUT2(r3, &(0x7f00000002c0)={0xc, {0x27, "bcb2117530922f76b8d67f9b24d2144bef40e73551bde50fbb358576edad80d5e276d176946f1a"}}, 0x2d) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6600be007465fa051a64b17b1490cbdce1b3720000000628a2810a7efba6000000000000000000b5030094c258e9be4d714281964c0c237227000003000041bba563cfe7"], &(0x7f0000000080)=0x2c) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000000)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x50000) getsockopt$inet6_buf(r6, 0x29, 0xf8, &(0x7f00000001c0)=""/240, &(0x7f0000000140)=0xf0) [ 870.587690] XFS (loop3): Invalid superblock magic number 01:47:46 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x100, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r2}, 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000300)={r2, @in={{0x2, 0x4e21, @empty}}}, 0x84) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010006000000000000001b00000008009a000200d2"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x24, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 01:47:46 executing program 1: clone(0x20020a04ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 870.812917] XFS (loop0): Mounting V4 Filesystem [ 870.855580] XFS (loop0): totally zeroed log [ 870.865603] XFS (loop0): failed to read root inode 01:47:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) 01:47:46 executing program 1: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000180)=0x14) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000100)={0x5, 0x1, 0x1, 0x1, &(0x7f0000000000)=[{}]}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x52e8a361, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a027aebdb293372a39dff21690035a8f32508f715", 0x8f}], 0x0, 0x0) [ 870.908297] XFS (loop3): Invalid superblock magic number 01:47:46 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{0x0}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000100)={0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) exit_group(0x80000001) 01:47:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) 01:47:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x1fffffffffffc}], 0x1400, 0x0) [ 871.246740] XFS (loop3): Invalid superblock magic number 01:47:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20800, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe750b3a53d97e97e8da7b0ddc1d6288008b986ce700c3d547d620823d76e6608245fd485a714722340d22145105d6fcc8ad92195f00bf13474eb50231685f205bac3a00814fa735fcf4e05429b1dab32fde43cdd2eded88ef83413cda50d0fcb21e4dde291805227f9e265f68dd43fcb6bcf7cbc441fdc098801eaa4af379b69eeab4f771a65a834292afdbd3dd4c5d6a59a0f"], &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x10001, 0x2, 0x2, 0x2, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x7fff, 0x6, 0xffffffe1, 0x0, r3}) 01:47:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:47:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$pppoe(0x18, 0x1, 0x0) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="49342003a22148cad1158b05f94286434b25620e57704a920aab2afa6c39d6dc9fe2aa112fe31fc152add52611c03255dc826d1b794fe2f8be51cf0a18c1e2ab220c50e359756094015d62447d02aaf726270e9bf72257c2927bbba4dc50718a5b5f89c86c68a75b943286fe70810af6bc40c4f000a6c9dbab0cf1a57840bbc954387949136d5b49cf46fefa1cb107ffdc07b0a28ee9875356957ca9ff5cff752adeea2fbe65e5ce77a528334b65f15f2bd29e464b90fb86e8d885fa46bc1c4bcd47817ae1e03e91b6ca98fbe8217a59bb0a4d845383887d1f24", 0xda}, {}, {&(0x7f0000000040)="5a6ef59d", 0x4}, {&(0x7f0000000100)}, {&(0x7f0000000140)="76d4972c23cf482a90b998d7774952346d9b6f702e8a7e04301da8e38d5f25096861f6040697", 0x26}], 0x5, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', r3}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 871.534438] XFS (loop5): SB sanity check failed [ 871.540509] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 871.596521] XFS (loop5): Unmount and run xfs_repair 01:47:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000000)=[{}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 871.618085] XFS (loop3): Invalid superblock magic number [ 871.630137] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 871.663449] ffff888088629000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:47:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:47:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400fc00a563cfe7"], &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r3, 0x300, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000810) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r4, 0x309}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x128, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000080}, 0x50) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 871.748857] ffff888088629010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 871.814508] ffff888088629020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8af, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) [ 871.855299] ffff888088629030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 871.913401] XFS (loop3): Invalid superblock magic number [ 871.919082] XFS (loop5): SB validate failed with error -117. 01:47:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x9, &(0x7f0000002680)=[{&(0x7f0000002380)="5cf3271c2d720be9fdd9711fb43898dc424421a6478d3bf876901c697b9c2a8d91391e4d3874e669ae05a16dc5a580773a4e2d", 0x33, 0x1}, {&(0x7f0000000280)="4d8159c98ea6ee56cb6177a2e783244e098507d334ac24ea01c2b951d2a379740874d9f1544d30aa4e5cb852c229f1bdf488a8febcd223c741554ec0794b369acc1538ee9663de86ec52cf03179bcbee2abecd12d4e62a97b08cec7a198eccc7ac1617614f340a1676ddf42ec3f700000000", 0x72, 0x101}, {&(0x7f0000000300)="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", 0x1000, 0x100000000}, {&(0x7f0000001300)="7ffa5b5cbe8f3802358a7bbe60d22eb1d9f1692dcb8781b48c4f161face2a3e79e7366af060554cf467601f3330cc6e9943e8260bd38d3a03b041897f4366610918137223acab10b3b963ad88a7b34348ace6f2fd02257f0c5dc2e3ca2efe4ef0ca9668696e53293", 0x68, 0x2}, {&(0x7f0000001380)="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", 0x1000, 0x7}, {&(0x7f0000002840)="e09411f7f49c17e8c8725c620f0b1c444a7843bf23512a79aa0de19a1ecc7a976af155d93906acbb1af14fb9b978df7880cdb9c124b68388d126194e385f9960d6068fd6665b71216d36df2da1a19c43a88aa97a59d8e7c6acdbb32b177504d530820f7080d396031909ce81045f99f3788438dcee875af8c4bfb45e22365a2f5a1701cdfa286f1030f97bb0a9f5281bdc6c9e8d9eeb53b99097ad63a4cbe6eeb133c0", 0xa3, 0x12}, {&(0x7f0000002440)="d69405404a2ef8236079344a4d636d23fd7c8df0198f058e69a59e6a40aa4c281925c3542f3b46cd16867fa1d29cfee5666ec6cfd0def27e645541a7fecbb6d0894fff060f1f5effb1900815b48fd94591e8df1ed43a4651794958ce23ca49c07600674f9933de609bbcf43f9fcf4aa1cd48612a41d97459b33b8575d7d5152f37c1546d3b4921e35fb5392338d84eaca69409b47a59adae4b1bf05d2562ec53b97ede129b2371a30d55939ea8c424d070b0e1f608d0cbe811932ace6e3d70255c99f265e547a28abb29c3ec327c2a6c3d7fb991f7aec7ab", 0xd8, 0x5}, {&(0x7f0000002540)="cce2e0477d3516f416c51a4f977b12c5ef632184ebffd5de57d38458a4652f1940375cd38c890464870fac3f0007fbfa3825a84c81e0fddcdd0012bc7d52057b8212cd89f84b04c7db445c45417f50a65db4fae0a94e9229d4b80da6d85312517c9ef54e49533ebeff4767b453059d30682926ba9285d5", 0x77, 0x200}, {&(0x7f00000025c0)="cdd507317f45479d67b46159fed6c49457f8e77bf5ec2cd0a130a5a92f7ddc94b1dd400d492d6ce602c09f650caa18fcffd6b7b583ef32f913e098f2899798c32865c9e813ff701e675a7411453ef5767521bea7ad1a6640253e5b10052634db8cf42c6e4caf03bef224942313d88ef2d7315d573a20dc9168e5dddd8236e3e51df73a5eb16fec628bdf0688aeffaf2c7b401d83c5ed4571363bbdcd5bca196642299dad19503730bb4a0580185a31b63b31030f9975e45ba6b0", 0xba, 0xfffffffffffffffc}], 0x2000000, &(0x7f0000002780)={[{@fat=@codepage={'codepage', 0x3d, '737'}}, {@fat=@quiet='quiet'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@smackfstransmute={'smackfstransmute'}}, {@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/dsp\x00'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@subj_user={'subj_user', 0x3d, '/dev/dsp\x00'}}, {@fowner_lt={'fowner<', r2}}]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xa0400, 0x0) write$dsp(r3, &(0x7f00000001c0)="c15a77631ab6486cc4cdc24f7edd1ccbc2e009cca94ad6354503091bd2d82a7cc9d96b46dbbdbf9d245a588de4b2bf1d74028ad70b7fe69f763a9d21254465c7bd05455b0eb76134462768f46f7df1e9998bd7f8340059cbe087ff9371beb4e33857e9bb41c2aa7623fb053529e37db1ccd806708e22154447ca6dc18a19bc5041dabecbb6de4c2d9b1d6048da94729a9034ca20086d5b637b438ac82cca27a6f456a954ae7f24252026fb745a949fbf3b07becc1d16cfea96414e", 0xbb) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setrlimit(0x1, &(0x7f0000000000)={0xfff, 0x80}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x2204000, 0x0) 01:47:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a00000001000010000000000100", 0x5d}], 0x8000, 0x0) 01:47:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c3, 0x0, &(0x7f00000000c0), 0x4fc6c89283ab0ca7, 0x0) [ 872.337949] XFS (loop3): Invalid superblock magic number [ 872.346479] XFS (loop5): SB sanity check failed [ 872.356544] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:48 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a00000001000010000000000100", 0x5d}], 0x8000, 0x0) [ 872.464094] XFS (loop5): Unmount and run xfs_repair [ 872.491577] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 872.542719] ffff888218087000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 872.600109] ffff888218087010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 872.616116] XFS (loop3): device supports 512 byte sectors (not 0) [ 872.620616] ffff888218087020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 872.643146] ffff888218087030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 872.660188] XFS (loop5): SB validate failed with error -117. 01:47:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a00000001000010000000000100", 0x5d}], 0x8000, 0x0) 01:47:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x5c, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="64f5ff00", @ANYRES16=r3, @ANYBLOB="04002abd7000ffdbdf2507000000080009000300000005000d0000000000060003008100000008000c000400000006001b004e2400000500040008000000050022000000000006001b004e22000005000d00000000000500810000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280), &(0x7f00000002c0)=0x14) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:47:48 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402000400000400", 0x6d}], 0x8000, 0x0) 01:47:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000000)={0x800}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 872.999300] XFS (loop3): device supports 512 byte sectors (not 0) 01:47:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x301200, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000010000000004000000a563cfe79dfd1c8d4fd5afd32e9b853d048e1ce4dc445de93f30d6ba6a6d18eb375d281131bdf0da4ee35146db0da1041bb1d4e74c8154b38bd0e0718cf6c8e3b16acc18bc37f9df2c67c1422195d1e156b759bcc9fbeb652f282176d0c99959f1fe1b545b04d22dd32a05b11eac7ebf59f2148d7c6e1bbf8eaadcf5ffce9aeb1d34a4169f35"], &(0x7f0000000080)=0x2c) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000740), &(0x7f0000000780)=0xe) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$AUDIT_TTY_SET(r5, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4040102}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x18, 0x3f9, 0x1, 0x70bd2d, 0x25dfdbff, {0x1, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000000) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000c40)={0x250, r6, 0x1, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x180, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5d0b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4d25}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9c02}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x208f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2712ab71}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf7f7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24365539}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4eee}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x66c94169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa6e5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x13c8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5fc5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x628fb9e1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3754}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2fc01546}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30bb4714}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb003}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55d814c8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36a97a67}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e0e9e30}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x55c2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd075fcb}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x246d0cda}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x78ca}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc099db}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8b88}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xafd2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55f44ce9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64ef597}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x930e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5917fb22}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e36dd6a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e1d914c}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e00}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb69e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x14e6a90c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e85}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7185d50c}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcf81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x253e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1c}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xbc, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7eb6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69fbcb25}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f3aa474}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x60cf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e1e7eca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5da}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa5ee}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e6365fa}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc08}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x22dcb5bb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb47d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f0f15b4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f2b4264}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x187b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2eef82de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe75a}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x124cf265}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7c27}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf3b0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6231}]}, {0x4}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x48081}, 0x800) recvfrom$netrom(r3, &(0x7f0000000640)=""/238, 0xee, 0x62, 0x0, 0x0) r7 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572002300000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) getsockopt$IP_SET_OP_GET_FNAME(r7, 0x1, 0x53, &(0x7f0000000100)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000140)=0x2c) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x400000) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x2e, @loopback, 0x4e24, 0x0, 'wrr\x00', 0xa, 0x1000, 0x57}, 0x2c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000100)='.\x00', &(0x7f00000001c0)=""/145, 0x91) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 873.068086] XFS (loop4): SB sanity check failed [ 873.073064] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff 01:47:48 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 873.138112] XFS (loop4): Unmount and run xfs_repair [ 873.140157] IPVS: set_ctl: invalid protocol: 46 127.0.0.1:20004 [ 873.155834] XFS (loop4): First 64 bytes of corrupted metadata buffer: 01:47:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0xea60}, 0x14, 0x4, 0x7f}], 0x18) exit_group(0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_LINK(r2, 0x40044160, &(0x7f0000000000)=0x200) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 873.188411] ffff888050398000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 873.204488] IPVS: set_ctl: invalid protocol: 46 127.0.0.1:20004 [ 873.223786] ffff888050398010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 873.267007] ffff888050398020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 873.300375] ffff888050398030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 873.334813] XFS (loop5): SB sanity check failed [ 873.340752] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 873.353195] XFS (loop3): device supports 512 byte sectors (not 0) [ 873.364275] XFS (loop5): Unmount and run xfs_repair 01:47:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="0909c4f5ac", 0x5, r0) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r4, r6, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000140)='big_key\x00', &(0x7f00000001c0)=@chain={'key_or_keyring:', r4, ':chain\x00'}) 01:47:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402000400000400", 0x6d}], 0x8000, 0x0) [ 873.397177] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 873.419689] ffff888218ef2000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 873.438490] ffff888218ef2010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:47:49 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a00000001000010000000000100", 0x5d}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 873.453604] ffff888218ef2020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x1ff) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000100ffffa563cfe7"], &(0x7f0000000080)=0x2c) write$evdev(r3, &(0x7f0000000000)=[{{}, 0x4, 0x4, 0x401}, {{}, 0x3, 0x200, 0x1}, {{}, 0x9, 0x9, 0xffff}], 0x48) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 873.512721] ffff888218ef2030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 873.547398] XFS (loop5): SB validate failed with error -117. [ 873.575936] XFS (loop3): device supports 512 byte sectors (not 0) [ 873.615325] XFS (loop4): SB sanity check failed 01:47:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="3000000010000108fcff7a103e87bf3537180000", @ANYRES32=0x0, @ANYBLOB="000000000008000008000400", @ANYRES32=r4, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000004000000a563cfe700000000000000000000000089bafb6e9572ad82729f045f4b03a2020c721bc1f1e795f3f1387cde8dbb02f9d5a5a257c4d79da15c9db4e003576bd6a2cf2f260000000000000000007ef7e384cc54906c464ffd167442ce5909ad08d5aebcf60b24aa9a2c6cf1a5467060aa36197dd6124eca4a81f1a47fc51e5925a9e7a915c244a892d0ce051ff7fd5199a356adbf1351b84a0f0cae5ef4b4d72d1ed46259bb24902c05ee4c17e718af59d013de51ce0c1f"], &(0x7f0000000080)=0x2c) sendmsg$NFQNL_MSG_VERDICT_BATCH(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x14, 0x3, 0x3, 0x3, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x8841}, 0x4000090) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000000)={@rand_addr=0x64010100, @local, r4}, 0xc) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000400), 0x1) 01:47:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x3, 0x42, [], 0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/66}, &(0x7f0000000240)=0x78) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:49 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a00000001000010000000000100", 0x5d}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 873.620262] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff [ 873.664750] XFS (loop4): Unmount and run xfs_repair [ 873.705658] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 873.744628] ffff88805d20a000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 873.776192] ffff88805d20a010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:47:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66694fc107000000005680535a4bf593000040000000000004ec7d54000000a563"], &(0x7f0000000080)=0x2c) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0x4, 0x8001, [], &(0x7f0000000100)=0x8}) [ 873.816468] ffff88805d20a020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 873.831054] ffff88805d20a030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 873.879550] XFS (loop5): SB sanity check failed [ 873.886046] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 873.897763] XFS (loop3): device supports 512 byte sectors (not 0) [ 873.919783] XFS (loop5): Unmount and run xfs_repair [ 873.937220] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 873.951795] ffff88805d20a000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:47:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f00000001c0)=0x54) r3 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 873.971192] ffff88805d20a010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 873.992634] ffff88805d20a020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 874.012688] ffff88805d20a030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 874.035232] XFS (loop5): SB validate failed with error -117. 01:47:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402000400000400", 0x6d}], 0x8000, 0x0) 01:47:49 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a00000001000010000000000100", 0x5d}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x0, &(0x7f00000000c0), 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0x42}}}, 0x1e) [ 874.209707] XFS (loop5): SB sanity check failed [ 874.220060] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 874.236086] XFS (loop4): SB sanity check failed [ 874.242587] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff 01:47:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = dup(r0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000001c0)={{0x0, 0x0, 0x80}}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r2 = inotify_init() write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}, {0x20, 'xfs\x00'}, {0x20, 'A}-$'}], 0xa, "67441b11180f1782bddb3d083aa88c6d454239b9e589b905d3d76b9da62296c16ea42a01bc0820696f2c56bb45af8b730e6e4cb7489909e46b135231621f16552116a3634ddc91ae13b991bc40eff97475f2a9e5bfa6c3148c92ddc3658841e831ccc92ced1b98ed"}, 0x7e) [ 874.280069] XFS (loop5): Unmount and run xfs_repair [ 874.285572] XFS (loop4): Unmount and run xfs_repair [ 874.302917] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 874.322269] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 874.335005] XFS (loop3): device supports 512 byte sectors (not 0) [ 874.346682] ffff888219314000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 874.357053] ffff888095436000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:47:50 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402000400000400", 0x6d}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 874.387261] ffff888219314010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 874.397475] ffff888095436010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 874.407558] ffff888095436020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 874.417472] ffff888219314020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 874.427100] ffff888095436030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 874.437020] ffff888219314030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 874.446792] XFS (loop5): SB validate failed with error -117. 01:47:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0xc4) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f0000000000)='wg1\x00', 0x4) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) 01:47:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, 0x140a, 0x100, 0x70bd2a, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000881) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x140010, 0x0) 01:47:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000", 0x75}], 0x8000, 0x0) [ 874.614576] XFS (loop3): SB sanity check failed [ 874.619653] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000040)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 874.665369] XFS (loop3): Unmount and run xfs_repair [ 874.687700] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 874.710589] ffff8882184d5000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 874.720383] XFS (loop4): SB sanity check failed [ 874.725744] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff 01:47:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x4, @private2, 0x80}, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, [], 0x1}, 0xfffffffb}, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @in={0x2, 0x4e31, @broadcast}, @in6={0xa, 0x4e20, 0xfffffff8, @mcast1, 0x8}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0xfff, @loopback, 0x7}, @in6={0xa, 0x4e20, 0x6, @mcast1, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x64010101}], 0xcc) prctl$PR_SET_THP_DISABLE(0x29, 0x1) [ 874.773504] QAT: Invalid ioctl 01:47:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c746572000000000001000000000001000000000000000000000000000304000000a563cf362697c95c68f5e99bfc2993ad79e7"], &(0x7f0000000080)=0x2c) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000000)={0x7, "54f3ed4e1f20b7a1a34108ea21752bc8923aae8a2f964ac3ed2f19ed2b9c068d", 0x20, 0x80000001, 0x6, 0x1, 0x3}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 874.794362] ffff8882184d5010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 874.813555] ffff8882184d5020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 874.816057] XFS (loop4): Unmount and run xfs_repair [ 874.872048] ffff8882184d5030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 874.873640] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 874.890452] XFS (loop3): SB validate failed with error -117. 01:47:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xc73, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 874.916073] ffff888215cfa000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:47:50 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402000400000400", 0x6d}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 874.995612] ffff888215cfa010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 875.005629] XFS (loop5): SB sanity check failed [ 875.010701] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 875.030817] ffff888215cfa020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 875.039695] ffff888215cfa030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 875.049107] XFS (loop5): Unmount and run xfs_repair [ 875.064039] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 875.075951] ffff88805807d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 875.088237] ffff88805807d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 875.097891] ffff88805807d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 875.107610] ffff88805807d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 875.117044] XFS (loop5): SB validate failed with error -117. [ 875.179989] XFS (loop3): SB sanity check failed [ 875.188585] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000", 0x75}], 0x8000, 0x0) [ 875.228891] XFS (loop3): Unmount and run xfs_repair [ 875.247167] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 875.282630] ffff88809558d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 875.292241] XFS (loop5): SB sanity check failed [ 875.303896] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:51 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xf6, 0x2) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2d00000006000000100000d90000000004e2ff00000004000300000000000000040000009c0900007866730000"], 0x2d) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$sock_ifreq(r6, 0x8927, &(0x7f0000000380)={'veth1_to_team\x00', @ifru_data=&(0x7f0000000340)="50b38136cb64f63735df4d5118fbf024cd1f6d0d242b8ae8d594bb296f664eff"}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r7, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_SCAN_SSIDS={0x48, 0x2d, 0x0, 0x1, [{0x5, 0x0, [0x11]}, {0x9, 0x0, [0xc, 0x8, 0x1e, 0x1e, 0x6]}, {0x7, 0x0, [0x13, 0xa, 0x20]}, {0xa, 0x0, [0x12, 0x17, 0x16, 0x2, 0x1, 0x18]}, {0xb, 0x0, [0x8, 0xf, 0xe, 0x3, 0xd, 0x13, 0x8]}, {0xe, 0x0, [0x15, 0x20, 0x12, 0xa, 0x15, 0x7, 0x20, 0x11, 0x1, 0x1e]}]}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x7ff}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000051}, 0x40000) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)={r4, 0x13c0, 0x3, [0x3ff, 0x40, 0x6]}, &(0x7f0000000300)=0xe) getsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f00000001c0), &(0x7f0000000240)=0x4) [ 875.338520] ffff88809558d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 875.355954] XFS (loop5): Unmount and run xfs_repair [ 875.393431] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 875.410000] ffff88809558d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 875.430780] ffff888061771000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 875.451366] ffff88809558d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 875.470843] ffff888061771010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 875.480283] XFS (loop4): SB sanity check failed [ 875.486266] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff 01:47:51 executing program 1: clone(0x2000200cffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 875.504693] XFS (loop3): SB validate failed with error -117. [ 875.515569] ffff888061771020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 875.528787] XFS (loop4): Unmount and run xfs_repair [ 875.543503] ffff888061771030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 875.548331] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 875.564209] XFS (loop5): SB validate failed with error -117. [ 875.573105] ffff8880a8ecd000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 875.609388] ffff8880a8ecd010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:47:51 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab42402000400000400", 0x6d}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="58465342000010000000000000001000000000000000000000000000000000003400edfb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7c}], 0x0, 0x0) [ 875.668848] ffff8880a8ecd020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 875.694807] ffff8880a8ecd030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000", 0x75}], 0x8000, 0x0) [ 875.805324] XFS (loop5): bad version [ 875.809671] XFS (loop5): SB validate failed with error -22. 01:47:51 executing program 0: clone(0x4d4ad100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000140)={'security\x00', 0x4, '\b\x00\x00\x00'}, &(0x7f0000000080)=0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4dac00, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, r5, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x20008800) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x90, r5, 0x205, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffffffffffff0000}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x588}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x28}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}]}, 0x90}, 0x1, 0x0, 0x0, 0x40001c0}, 0x10) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r8 = openat$cgroup_ro(r7, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r8, 0x40045431, &(0x7f0000000040)=0x1) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 875.910635] XFS (loop3): SB sanity check failed [ 875.915987] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 875.960327] XFS (loop3): Unmount and run xfs_repair [ 875.979224] XFS (loop5): bad version [ 875.986219] XFS (loop5): SB validate failed with error -22. [ 875.993386] XFS (loop4): SB sanity check failed [ 875.999636] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff [ 876.023158] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 876.023854] IPVS: ftp: loaded support on port[0] = 21 [ 876.055520] ffff8880912c7000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 876.078182] XFS (loop4): Unmount and run xfs_repair [ 876.098890] XFS (loop4): First 64 bytes of corrupted metadata buffer: 01:47:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) r1 = socket$isdn(0x22, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) [ 876.100269] ffff8880912c7010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 876.121267] ffff888219cd7000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 876.125729] ffff8880912c7020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 876.160038] ffff888219cd7010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 876.192009] ffff888219cd7020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 876.202775] ffff8880912c7030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 876.228007] ffff888219cd7030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 876.252875] XFS (loop3): SB validate failed with error -117. 01:47:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c", 0x79}], 0x8000, 0x0) [ 876.347458] XFS (loop5): SB sanity check failed [ 876.352602] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:52 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000", 0x75}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 876.388491] XFS (loop5): Unmount and run xfs_repair [ 876.415064] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 876.437256] ffff888058a0c000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 876.476058] ffff888058a0c010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 876.498957] XFS (loop4): SB sanity check failed [ 876.501012] ffff888058a0c020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 876.504703] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff 01:47:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000040)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) [ 876.542762] ffff888058a0c030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 876.570260] XFS (loop5): SB validate failed with error -117. [ 876.616587] XFS (loop3): SB sanity check failed [ 876.621722] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 876.622216] XFS (loop4): Unmount and run xfs_repair [ 876.694447] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 876.705977] XFS (loop3): Unmount and run xfs_repair [ 876.739785] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 876.752248] ffff8882177bb000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 876.769214] ffff888218cd7000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 876.784290] ffff8882177bb010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 876.797990] XFS (loop0): Mounting V4 Filesystem [ 876.800167] ffff888218cd7010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 876.816318] XFS (loop0): totally zeroed log [ 876.817776] ffff8882177bb020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 876.828664] XFS (loop0): failed to read root inode [ 876.841636] ffff888218cd7020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 876.855375] ffff8882177bb030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 876.871570] ffff888218cd7030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 876.893241] XFS (loop3): SB validate failed with error -117. 01:47:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = socket$inet6(0xa, 0x2, 0x0) sched_yield() r1 = dup(r0) socket$inet6(0xa, 0x2, 0x0) r2 = dup(r0) r3 = accept4$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c, 0x80000) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0x4, "a563cfe7"}, &(0x7f0000000100)=0x28) mmap$fb(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x4010, r2, 0x8c000) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000240)={0x336, 0xa, 0x4, 0x0, 0xb27f, {r4, r5/1000+60000}, {0x1, 0x1, 0x40, 0x7, 0x1, 0x9, "2fa52a0c"}, 0x200, 0x3, @fd=r7, 0x7, 0x0, r1}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c836572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='xfs\x00') syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) close(0xffffffffffffffff) 01:47:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c", 0x79}], 0x8000, 0x0) 01:47:52 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000", 0x75}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 877.088113] XFS (loop0): Mounting V4 Filesystem [ 877.107219] XFS (loop0): totally zeroed log 01:47:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a, 0x3f}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = dup2(0xffffffffffffffff, r1) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f00000000c0)={0x2}) [ 877.135965] XFS (loop0): failed to read root inode [ 877.208656] XFS (loop4): SB sanity check failed [ 877.217056] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff [ 877.245332] XFS (loop3): SB sanity check failed [ 877.250228] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 877.253498] XFS (loop4): Unmount and run xfs_repair [ 877.288399] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 877.298778] XFS (loop3): Unmount and run xfs_repair [ 877.304196] ffff888096884000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 877.304205] ffff888096884010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 877.323728] XFS (loop0): Mounting V4 Filesystem [ 877.337920] XFS (loop0): AIL initialisation failed: error -12 [ 877.358996] XFS (loop0): log mount failed [ 877.373032] XFS (loop5): Invalid superblock magic number [ 877.380424] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 877.388372] ffff888096884020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x8, 0x40, @udp='udp:syz2\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x4001}, 0x808) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x8200, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fanotify_init(0x40, 0x40000) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000200)=0x1) r3 = dup(r1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66716c746572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e23, @remote}, {0x2, 0x4e21, @empty}, 0x104, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)='bridge0\x00', 0x0, 0xffffffffffff0c12, 0x3}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4000c0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000000c0)=0x2, 0x4) [ 877.410557] ffff8880a049b000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 877.410603] ffff888096884030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 877.519455] ffff8880a049b010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 877.555145] ffff8880a049b020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 877.615064] ffff8880a049b030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 877.670481] XFS (loop5): SB sanity check failed [ 877.674074] XFS (loop3): SB validate failed with error -117. [ 877.678751] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000", 0x75}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 877.714278] XFS (loop0): Mounting V4 Filesystem [ 877.728143] XFS (loop0): totally zeroed log [ 877.745039] XFS (loop0): failed to read root inode [ 877.758343] XFS (loop5): Unmount and run xfs_repair 01:47:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c", 0x79}], 0x8000, 0x0) [ 877.799652] XFS (loop5): First 64 bytes of corrupted metadata buffer: 01:47:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="0600ad217b071f635458f481439c2b09623475986514dbeee70adf9a3a5f0ea4e5e801df332aa04c10b1672804a31719502ad37fb3fe14f24c8a0ac93ee7414a747f0c37488b06931ade8031ee6f6af14fbb52509c7d2a98bb75f83946a9cfd0bef1e78094e305c03ed462492d58dbec6b41b02c66785cfff2908c2d9be5f86097998d8711bad2714686ffd7a47eeba2f6c266edd586d7a1c1f39df2aa2d9eda259a4a7363cebe55f930f2b4dab3d241b2b02779a081937172b601a6d3e0075f9cd3cd48da1b4b2965c5f38aa3037e24f8c871fa8e49b05b9d7d49ddbfe2631b7127182fd01f263fa9f46e25d9137396a99c5a8b", 0xf4, 0x800}], 0x4, &(0x7f00000002c0)={[{@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@discard_size={'discard', 0x3d, 0x10001}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 877.840478] ffff88805807d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 877.878783] ffff88805807d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 877.918207] ffff88805807d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 877.955759] XFS (loop3): SB sanity check failed [ 877.959987] ffff88805807d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 877.961016] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 878.017550] XFS (loop5): SB validate failed with error -117. [ 878.047049] XFS (loop4): SB sanity check failed [ 878.052056] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff [ 878.104792] XFS (loop3): Unmount and run xfs_repair [ 878.109982] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 878.121834] XFS (loop4): Unmount and run xfs_repair [ 878.144070] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 878.150852] ffff888219223000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.150862] ffff888219223010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.150869] ffff888219223020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 878.150877] ffff888219223030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 878.150908] XFS (loop3): SB validate failed with error -117. [ 878.182137] XFS (loop0): Mounting V4 Filesystem [ 878.241113] XFS (loop0): totally zeroed log 01:47:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/exec\x00') write$UHID_INPUT2(r0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vim2m\x00', 0x2, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 878.280400] XFS (loop0): failed to read root inode 01:47:54 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c", 0x79}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 878.339845] ffff888219220000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.400830] ffff888219220010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.409715] ffff888219220020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 878.477481] ffff888219220030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x444000, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000003c0)={0x9, 0x99, 0x0, 'queue0\x00', 0x7}) r3 = dup2(r2, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000001080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000340), r4, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r4, 0x2}}, 0x18) [ 878.530970] XFS (loop5): SB sanity check failed [ 878.535871] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 878.573479] XFS (loop5): Unmount and run xfs_repair [ 878.586198] XFS (loop5): First 64 bytes of corrupted metadata buffer: 01:47:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a", 0x7b}], 0x8000, 0x0) [ 878.623476] ffff888062a57000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.669570] ffff888062a57010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.698417] ffff888062a57020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 878.732549] ffff888062a57030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 878.763920] XFS (loop5): SB validate failed with error -117. [ 878.770113] XFS (loop3): SB sanity check failed [ 878.779983] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 878.806294] XFS (loop3): Unmount and run xfs_repair [ 878.817115] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 878.825688] XFS (loop4): SB sanity check failed [ 878.830406] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff [ 878.850057] ffff888215f4b000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.866812] XFS (loop4): Unmount and run xfs_repair [ 878.876791] ffff888215f4b010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.895902] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 878.913046] ffff88804248e000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.924429] ffff888215f4b020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 878.942489] ffff88804248e010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.952592] ffff888215f4b030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 878.970386] ffff88804248e020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 878.982177] XFS (loop3): SB validate failed with error -117. [ 878.989072] XFS (loop0): Mounting V4 Filesystem [ 879.005837] ffff88804248e030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 879.018675] XFS (loop0): totally zeroed log [ 879.037953] XFS (loop0): failed to read root inode 01:47:55 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c", 0x79}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f00000003c0)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000001c0)=ANY=[@ANYBLOB="e94300001400000004000000018000000040e93bb086d51df5e65ee8fb5a396daf2e07afb2c5943400167231a4dbdda7b37a5cb21b42010400000e250d352dea6c07c09e97df2a6000"]) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x72, 0x0, &(0x7f00000000c0), 0x2000002, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000340)={0xa00000, 0x16e, 0x8, r4, 0x0, &(0x7f0000000300)={0x5138c6c85b65af2f, 0xff, [], @value64}}) ioctl$VIDIOC_SUBDEV_G_CROP(r5, 0xc038563b, &(0x7f0000000380)={0x0, 0x0, {0x1, 0x7ff, 0x8, 0x1000}}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2a000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1f, &(0x7f0000000240)=""/161, &(0x7f0000000140)=0xa1) ioctl$RTC_PIE_OFF(r7, 0x7006) 01:47:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a", 0x7b}], 0x8000, 0x0) [ 879.251620] XFS (loop0): Mounting V4 Filesystem [ 879.264911] XFS (loop0): totally zeroed log [ 879.304231] XFS (loop3): SB sanity check failed [ 879.305357] XFS (loop0): failed to read root inode [ 879.309136] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:47:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e7}], 0x0, 0x0) [ 879.414139] XFS (loop5): Invalid superblock magic number [ 879.415926] XFS (loop3): Unmount and run xfs_repair [ 879.434600] XFS (loop4): SB sanity check failed [ 879.439531] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff [ 879.449957] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 879.494224] ffff888218d34000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 879.500007] XFS (loop4): Unmount and run xfs_repair [ 879.525718] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 879.538863] ffff888218d34010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 879.558103] ffff88804119b000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 879.588435] ffff888218d34020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 879.593037] ffff88804119b010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 879.622925] ffff888218d34030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:55 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x80000) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x101) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000280)=0x1, 0x4) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r0, 0x40184152, &(0x7f0000000240)={0x0, &(0x7f0000000140)=[&(0x7f0000000100)="7a072dfa3debaabaa41bc9fc5041a501", &(0x7f00000001c0)="7dfc7b6e4c12da9431fc5b89597acc4e2bc436af4f67885cb42a2debba7b3073db35086f0faf916d1761ef51810fbf423a92f6a01f367ef09ea7cce4817bf53ae0e2a3aa2bf8d62bf9fc85d76c0baef0582fde4f4657c437db6ba1bcc61c78a3863924a60bfa7c442a5a2fc4902f99f720b439c879e0d0dc2a"], 0x6}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x100, 0x2) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 879.654289] XFS (loop3): SB validate failed with error -117. [ 879.685306] ffff88804119b020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:55 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c", 0x79}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 879.730566] ffff88804119b030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a", 0x7b}], 0x8000, 0x0) [ 879.859484] XFS (loop5): SB sanity check failed [ 879.864877] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 879.888655] XFS (loop0): Mounting V4 Filesystem [ 879.902251] XFS (loop0): totally zeroed log [ 879.918469] XFS (loop5): Unmount and run xfs_repair [ 879.921347] XFS (loop0): failed to read root inode [ 879.941097] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 879.993745] ffff8882192fd000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 879.996772] XFS (loop3): SB sanity check failed [ 880.018892] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 880.047632] ffff8882192fd010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 880.069186] XFS (loop3): Unmount and run xfs_repair [ 880.086933] XFS (loop3): First 64 bytes of corrupted metadata buffer: 01:47:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000001c0)={{0x0, 0x0, @descriptor="f15872cc2f9da56d"}, 0xf9, 0x0, [], "13e0b605c07e6286acadb9a87e731af3ee587e25a5504ccb236865d6cbf3d1bbbdf05a5b33198f080d2b8f7b8c71244484d08061823394a20e4935733f5d1b83098a4962e97bd2a4a01bbce5fda4afd8c63097b1f900d028b931b04ce086abada4cccfe00ecc80fac46edcbef2f6b7d1361b8ef83ffaecc33e54f4a9147b5f5fd5312770d73faf05d3499c58b73741298002c075636e75e72a32f26f43bb2abfab4bcaa6b26702ce400981fa0ba7dd88484bcc9e45f6224f8eb9a4ddc65c5fc77c834127d7c2fbefef731b8155c6f6269a83a55cc747eeebd109151ccafd4116c431fdac9b038344ef04bdda663f6ee16dc074c3cdb0de7c97"}) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r5, r7, 0x0) keyctl$instantiate(0xc, r4, 0x0, 0x0, r5) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0xfffffffffffffffe}, {0x0, 0x0, 0x5c6fc6e3}], 0x2000040, 0x0) [ 880.088623] ffff8882192fd020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 880.110849] XFS (loop4): SB sanity check failed [ 880.115738] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb_quiet block 0xffffffffffffffff [ 880.118292] ffff88821912a000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 880.191558] XFS (loop4): Unmount and run xfs_repair [ 880.226833] ffff88821912a010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 880.230597] ffff8882192fd030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 880.248989] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 880.269201] ffff88821912a020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 880.294567] ffff8882193db000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 880.314055] ffff88821912a030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 880.322757] XFS (loop5): SB validate failed with error -117. [ 880.344245] ffff8882193db010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 880.367163] XFS (loop3): SB validate failed with error -117. [ 880.382430] ffff8882193db020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 880.413337] ffff8882193db030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 880.446005] XFS (loop0): Invalid superblock magic number 01:47:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/llc/core\x00') ioctl$vim2m_VIDIOC_STREAMOFF(r1, 0x40045612, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a", 0x7b}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) keyctl$clear(0x7, r0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 880.743871] XFS (loop3): SB sanity check failed [ 880.749083] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 880.763060] XFS (loop0): Mounting V4 Filesystem [ 880.785393] XFS (loop0): totally zeroed log [ 880.809297] XFS (loop0): failed to read root inode [ 880.835339] XFS (loop4): Mounting V4 Filesystem [ 880.845332] XFS (loop3): Unmount and run xfs_repair [ 880.851052] attempt to access beyond end of device [ 880.873597] XFS (loop5): SB sanity check failed [ 880.878439] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 880.879361] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 880.895725] loop4: rw=4096, want=131073, limit=131071 [ 880.913855] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 880.927014] XFS (loop5): Unmount and run xfs_repair [ 880.938531] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 880.947925] XFS (loop4): empty log check failed [ 880.959044] ffff888215fa2000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 880.978898] XFS (loop4): log mount/recovery failed: error -5 [ 880.986158] ffff8880504d0000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 881.009954] XFS (loop4): log mount failed [ 881.016749] ffff888215fa2010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 881.033293] ffff8880504d0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 881.068118] ffff8880504d0020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 881.068888] ffff888215fa2020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000000)={0x3ff, 0xfffffffd, 0x2000, 0x4, 0x4}) 01:47:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 881.152841] ffff888215fa2030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 881.155518] ffff8880504d0030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 881.183695] XFS (loop3): SB validate failed with error -117. 01:47:57 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a", 0x7b}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 881.269886] XFS (loop5): SB validate failed with error -117. 01:47:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 01:47:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffb, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a, 0x10010}], 0x41, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x70, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x35, @local}, @in6={0xa, 0x4e22, 0x5, @loopback, 0xfffffffd}, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @local}, 0x8}, @in6={0xa, 0x4e21, 0x2, @private0, 0xff}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1, 0x6}, 0x8) [ 881.405074] XFS (loop4): Mounting V4 Filesystem [ 881.439385] attempt to access beyond end of device [ 881.465076] loop4: rw=4096, want=131073, limit=131071 [ 881.484221] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 [ 881.509287] XFS (loop4): empty log check failed [ 881.517938] XFS (loop3): SB sanity check failed [ 881.523158] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 881.527834] XFS (loop4): log mount/recovery failed: error -5 [ 881.576094] XFS (loop3): Unmount and run xfs_repair [ 881.581068] XFS (loop0): Mounting V4 Filesystem [ 881.594985] XFS (loop4): log mount failed [ 881.601874] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 881.602549] XFS (loop0): totally zeroed log [ 881.632429] ffff8882177b6000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 881.635470] XFS (loop0): failed to read root inode 01:47:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 881.676165] ffff8882177b6010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 881.721824] XFS (loop5): Invalid superblock magic number [ 881.723399] ffff8882177b6020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 881.766124] ffff8882177b6030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 881.815532] XFS (loop3): SB validate failed with error -117. 01:47:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x4) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0xe2100, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e20, 0x3, @empty, 0x3}}, 0x7, 0x46b}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r4, 0x1}, 0x8) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:57 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a", 0x7b}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 881.925366] XFS (loop0): Mounting V4 Filesystem [ 881.931861] XFS (loop4): Mounting V4 Filesystem [ 881.943122] XFS (loop0): AIL initialisation failed: error -12 [ 881.949589] XFS (loop0): log mount failed [ 881.966126] attempt to access beyond end of device [ 881.984354] loop4: rw=4096, want=131073, limit=131071 [ 882.011941] XFS (loop4): metadata I/O error: block 0x20000 ("xlog_bread_noalign") error 5 numblks 1 01:47:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x1, 'ip6tnl0\x00', {}, 0x854}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x58}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 882.058729] XFS (loop4): empty log check failed [ 882.072637] XFS (loop4): log mount/recovery failed: error -5 [ 882.128222] XFS (loop4): log mount failed [ 882.137542] XFS (loop5): SB sanity check failed [ 882.144254] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 882.157673] XFS (loop3): SB sanity check failed [ 882.177452] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 882.243061] XFS (loop5): Unmount and run xfs_repair [ 882.249703] XFS (loop3): Unmount and run xfs_repair [ 882.267382] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 882.273700] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 882.305438] ffff8882161b7000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 882.339005] ffff88821842d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 882.343228] ffff8882161b7010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 882.373581] XFS (loop0): Invalid superblock magic number 01:47:58 executing program 0: clone(0x54206800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 882.399143] ffff8882161b7020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 882.418540] ffff88821842d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 882.433726] ffff8882161b7030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 882.477243] XFS (loop5): SB validate failed with error -117. [ 882.498613] ffff88821842d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0xffff8e8f, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa808, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000035fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0xfd3}, {0x0, 0x57, 0x5c6fc6e3}, {&(0x7f00000001c0)="d3240143853dd4a4c4076c84093b92e9e297ac5cf16dab3b63c4408a20d92ce35710891a615e244c74d5dd7536da84c14af5b2de86226016355c5d620203dea3e41927f819e57eac4115baba8c4d3522c44072a50f3bf0036022425eb808dc4f55606bc61884c00d269db5d84f7de1eaa50738e7efc7594529237214d2848db2ee24d2297348111c95c00ac04211035036086e560d0dd0d2c00c1276d9fcec6f42e3a758da18db043da31e3845f38c347a7db82d3ccf6ec01217ad398be726dcec70ef232dea02b6e96eacd36dad907a4fdfca47befe1e213e5c6e6647618ad3c00603b78a", 0xe5, 0x7}, {&(0x7f00000002c0)="5f9aa79141dfe34b093acb3a0dfea1c34bb48806b35412f2375d61987da0ae89483512cbc36e12324e7326a10ec4b51c1f8ff1bb2709b3d6b7cb54f303bae6efa1a43bba37120f7db025a87263fdf1b5fa32cc1455de368cf94555923b836ad98223d9b4f5993370b0c0cab842796e07878f2914945292f299a03186423754f9411b12633846ffa0a5e7f73dbfb93f9af2f8b6801fc808a9d984ccdf5399956f3d2a9d6961273531eb120656b4f6751f20cd3b5ff583e88a2c7b3bcee9756c8f08da610a870afb63b684e214", 0xcc, 0xb95}], 0x0, 0x0) [ 882.553315] ffff88821842d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20800, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe750b3a53d97e97e8da7b0ddc1d6288008b986ce700c3d547d620823d76e6608245fd485a714722340d22145105d6fcc8ad92195f00bf13474eb50231685f205bac3a00814fa735fcf4e05429b1dab32fde43cdd2eded88ef83413cda50d0fcb21e4dde291805227f9e265f68dd43fcb6bcf7cbc441fdc098801eaa4af379b69eeab4f771a65a834292afdbd3dd4c5d6a59a0f"], &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x10001, 0x2, 0x2, 0x2, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x7fff, 0x6, 0xffffffe1, 0x0, r3}) [ 882.619549] XFS (loop3): SB validate failed with error -117. 01:47:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0xffffffffffffff56}], 0x0, 0x0) [ 882.906936] XFS (loop4): SB sanity check failed [ 882.912295] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 882.987924] XFS (loop4): Unmount and run xfs_repair [ 883.028971] XFS (loop4): First 64 bytes of corrupted metadata buffer: [ 883.058430] XFS (loop5): SB sanity check failed [ 883.063692] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 883.087148] ffff888040b6c000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 883.130422] XFS (loop5): Unmount and run xfs_repair [ 883.137880] ffff888040b6c010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 883.152616] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 883.161145] ffff888040b6c020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 883.186306] ffff88821a932000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 883.199793] ffff888040b6c030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 883.223501] ffff88821a932010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:47:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) [ 883.240387] XFS (loop4): SB validate failed with error -117. [ 883.246545] ffff88821a932020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 883.269734] ffff88821a932030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 883.285306] XFS (loop5): SB validate failed with error -117. 01:47:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:47:59 executing program 0: clone(0x20009000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000040)=0x8, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:47:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x808180) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x1, [0x4780]}, &(0x7f0000000100)=0x6) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:47:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:47:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x801, 0xaaaa82b, &(0x7f0000000000), 0x898804, 0x0) r0 = socket$inet6(0xa, 0x4, 0x3) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$sock_bt_hci(r1, 0x400448de, &(0x7f00000000c0)="e05a32b8789a8a331118daf907f7b95ba258f904d649fb0f647c0cf74da15d21dbbdda2088b25117936a2488769add8c4b1d8fa9dfb378ac786290a1b1a23b6539b42a5d2da4aa20cde833ae7edaf4a7db5a8301b84c77b7c23875bd38dc20d3934283f25bb7b254cc585ab3f4fcf8facbd003085381f27807a5ea7bb6e2d218231fc1495b2f3cb57fab807aef66a7e198be476af9c4e6381e599e449e5aae6e8e99491db4b88a1f44a7db") 01:47:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) [ 883.832254] XFS (loop5): SB sanity check failed [ 883.843843] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 883.889201] XFS (loop5): Unmount and run xfs_repair [ 883.911199] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 883.935984] ffff888018c04000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 883.973080] ffff888018c04010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.005061] ffff888018c04020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:47:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 884.037066] ffff888018c04030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:47:59 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) [ 884.080955] XFS (loop5): SB validate failed with error -117. 01:48:00 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:48:00 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) [ 884.287696] XFS (loop5): SB sanity check failed [ 884.294890] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 884.363907] XFS (loop5): Unmount and run xfs_repair [ 884.394586] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 884.439368] ffff8880172a8000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:48:00 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:48:00 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 884.557471] ffff8880172a8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.610789] ffff8880172a8020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) [ 884.684322] ffff8880172a8030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 884.713996] XFS (loop5): SB validate failed with error -117. 01:48:00 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:48:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:48:00 executing program 0: exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c7465722b73000000002200000000000000000004000000a563cfe7000000005d5289a6f7d698bf30ed06a282954d9bb4e6fa6c8668d874955f22eb21108c8affcc63888b80e4e5cf0adeb91ecd63377554e0bf2b6f585dddb67d5d5ab3e6defd65079755d501142ee4567d5f880d3281762bf1d38989c183f57e3c2a7002185dcc50915cbea27f30f20d3a8ceabe67db52a0a469af473d1cb016b475bedc50496b4aeb466bef33c6b3affa0481aec2f4c1702dfdffc791fb390d81618ce10e5b5837f16cc1e1bfe2a3e2e6da8df1c55b37b6a2a8f4a3a00b8a05d3b047792e899ca1a8ecf2"], &(0x7f0000000080)=0x2c) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000140)=0x9, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="66a8257465720071fd0000c97743b07f65599fa6265ce3ce77000000000000000000400000000000000000000000000000a563cfe717c2f5015e5f1e5b3e5d181e30417f52f7bb8010736776572fd1481f36c5fd6e99b820ac417238450b"], &(0x7f0000000080)=0x2c) getsockname$ax25(r1, &(0x7f00000000c0)={{}, [@default, @remote, @bcast, @bcast, @default, @bcast, @null, @default]}, &(0x7f0000000040)=0x48) 01:48:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:48:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:48:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) userfaultfd(0x80000) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendto$ax25(r1, &(0x7f00000001c0)="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", 0xfc, 0x4000004, &(0x7f00000000c0)={{0x3, @null, 0x7}, [@null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x4000}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) 01:48:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:48:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8000, 0x0) [ 885.346368] XFS (loop0): Mounting V4 Filesystem 01:48:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 885.366590] XFS (loop0): totally zeroed log [ 885.385187] XFS (loop0): failed to read root inode 01:48:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) 01:48:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x23102c10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, 0x1, 0xa, 0xb03, 0x0, 0x0, {}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4081}, 0x48004) 01:48:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 885.679225] XFS (loop0): Mounting V4 Filesystem [ 885.698018] XFS (loop0): totally zeroed log [ 885.709309] XFS (loop0): failed to read root inode 01:48:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000000000000", 0x3e}], 0x8000, 0x0) [ 885.838287] XFS (loop4): Invalid superblock magic number 01:48:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:48:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f00000001c0)={{0x2, 0x4, 0x8000, 0x80, '\x00', 0x9}, 0x0, [0xfff, 0x4, 0x6, 0x0, 0x4, 0x4, 0xfc3, 0x7, 0x100000001, 0x6, 0xa793, 0x1, 0x1, 0x6, 0x3, 0x2, 0x1a, 0x7, 0xfffffffffffffff9, 0x0, 0xff, 0xffffffffffffff80, 0x4, 0x7, 0x9, 0xd5a, 0x6, 0x4, 0x40, 0x7, 0x3, 0xc354, 0x1e, 0x2a, 0x0, 0xf0, 0x6, 0x8000, 0x0, 0x3f, 0x80, 0x7, 0x1, 0x5, 0x6, 0x6, 0x8000, 0x1, 0xfffffffffffffffa, 0x6, 0x0, 0x2, 0x3ff, 0x5, 0x100000001, 0x2, 0xba79, 0xffff, 0x5, 0x7, 0x8d5, 0x20, 0x6, 0x81, 0x2f49, 0x0, 0xffffffffffff8001, 0x100000000, 0x5, 0x9, 0x2, 0x180, 0x4, 0x2, 0xfffffffffffffffd, 0xd5b, 0x0, 0x40, 0x81, 0x3, 0x7, 0x1, 0x81, 0x7, 0xba0b, 0x1, 0x7fff, 0x3500, 0x7fff, 0xab6, 0x40, 0x3ff, 0x7, 0x5, 0x7, 0x2, 0xffffffff, 0x10000, 0x8, 0x0, 0xfffffffffffffffb, 0x4, 0x5, 0x0, 0x0, 0xbf3, 0x9, 0x1, 0x9, 0x6, 0x5, 0x61a, 0x2, 0xffffffff, 0x1, 0x8, 0x2, 0x8c, 0x0, 0x7, 0x7f, 0x7f, 0xd1, 0x7, 0x261, 0x5, 0x3, 0x5]}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="66696c746572000000000000000000005316931289110d7ef5cf54bb5d19ad0000000000000000000000000000000004000000a5636cdd9ed2ed5d093ad795fe5f88d015b5cfe7975dde1b8e41163edc679e2467b0eae14fd36cc33a06fd3510c248218fcba9d2159b"], &(0x7f0000000080)=0x2c) connect$rose(r1, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, 0x4, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @null, @default]}, 0x40) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, 0x0, 0x8000, 0x0) [ 886.120921] XFS (loop4): Invalid superblock magic number 01:48:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 886.208904] XFS (loop0): Mounting V4 Filesystem [ 886.223037] XFS (loop0): totally zeroed log [ 886.236352] XFS (loop0): failed to read root inode 01:48:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, 0x0, 0x8000, 0x0) [ 886.448135] XFS (loop4): Invalid superblock magic number 01:48:02 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x10000012, 0x0, 0x5, 0x400000, 0x0, 0x2}, 0x0) ptrace$getsig(0x4202, r0, 0x5, &(0x7f00000000c0)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, 0x0, 0x8000, 0x0) 01:48:02 executing program 0: r0 = socket$inet(0x2, 0x5, 0xffffd1ef) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e20, @multicast1}], 0x30) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000fea92fc72d26f50400000000000000004833f615ff27f9f0ab931c1fe74bb156cd36f42507cb49af194bb23053b7e92a472a7cd8e7bce7fed2d59a145a0b89b2531b293e0ef42d309a4f45405a2ae39cb2c46801553fc3b1f250187907b82166897a6169d8c64bfd0be0846d90c6475a8b7bacfe81a5d769bceec4e4b9a03fb5f1691e6b80dda7983b04d6a3cb52719979ee8e1212c918edc0f74c270908b0cda3306c72bfc7ae6e505bb8f7b0913c6cf68249722def4adc6829aa20bd969ef540f73c45aeeb732056a43e4e62d8c1a3f484e72716aee07b4c38499f2d50feb26e67fd3a78bbf8", @ANYRES16=r3, @ANYBLOB="00022cbd7000ffdbdf250500000008000c000100000008000800e0000001"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40000d0) exit_group(0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x101, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000100)={0x1f, 0x8000, 0x3ef}) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) ioctl$FIONCLEX(r4, 0x5450) 01:48:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x1000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) r7 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x387002) ioctl$SNDRV_PCM_IOCTL_REWIND(r7, 0x40084146, &(0x7f0000000140)=0x1) kcmp(r3, r5, 0x6, r6, r0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0), 0x8000, 0x0) [ 886.859226] XFS (loop0): Mounting V4 Filesystem [ 886.872940] XFS (loop0): totally zeroed log [ 886.880411] XFS (loop0): failed to read root inode 01:48:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5e6fc6e3}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) 01:48:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x1000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) r7 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x387002) ioctl$SNDRV_PCM_IOCTL_REWIND(r7, 0x40084146, &(0x7f0000000140)=0x1) kcmp(r3, r5, 0x6, r6, r0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 887.188166] XFS (loop0): Mounting V4 Filesystem 01:48:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0), 0x8000, 0x0) [ 887.213653] XFS (loop0): totally zeroed log [ 887.218468] XFS (loop0): failed to read root inode 01:48:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x1000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) r7 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x387002) ioctl$SNDRV_PCM_IOCTL_REWIND(r7, 0x40084146, &(0x7f0000000140)=0x1) kcmp(r3, r5, 0x6, r6, r0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'gretap0\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0), 0x8000, 0x0) 01:48:03 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 887.705801] XFS (loop0): Mounting V4 Filesystem [ 887.721714] XFS (loop0): totally zeroed log [ 887.743475] XFS (loop0): failed to read root inode [ 887.752513] FAULT_INJECTION: forcing a failure. [ 887.752513] name failslab, interval 1, probability 0, space 0, times 0 [ 887.800293] CPU: 0 PID: 10978 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 887.808389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.817751] Call Trace: [ 887.820355] dump_stack+0x1b2/0x283 [ 887.823994] should_fail.cold+0x10a/0x154 [ 887.828162] should_failslab+0xd6/0x130 [ 887.832139] __kmalloc+0x2c1/0x400 [ 887.835682] ? SyS_memfd_create+0xb9/0x3a0 [ 887.839926] SyS_memfd_create+0xb9/0x3a0 [ 887.843990] ? shmem_fcntl+0x120/0x120 [ 887.847877] ? SyS_clock_settime+0x1a0/0x1a0 [ 887.852303] ? do_syscall_64+0x4c/0x640 [ 887.856277] ? shmem_fcntl+0x120/0x120 [ 887.860165] do_syscall_64+0x1d5/0x640 [ 887.864062] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.869249] RIP: 0033:0x45ca59 [ 887.872434] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 887.880144] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 887.887418] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 887.894695] RBP: 000000000078bf00 R08: 0000000000008000 R09: 0000000000000001 [ 887.901972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 887.909247] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{0x0}], 0x8000, 0x0) 01:48:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x2, 0x44880) fcntl$dupfd(r1, 0x0, r2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x9) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000000380)=[{&(0x7f00000000c0)="65e6ca48598c3472f00a30a1908efc7077c26f95b46b09089f8a378e6b6f9138961251a2c48a7141575dcbd88fdfcd6c91ce0db3adbf8e1e54fd753376ce82b9c1996fd4362537defee12b66e903bdc8e1d3f3992b3361d9ec54ca9bace4296693945a591a5d1c3e082201cba1812c9d2e8f0bca6acda1259823c9a29dd943a259a02b3e55283e1b29018119bc661ef785ac3f50858012a14fde04371d", 0x9d, 0xe3c}, {&(0x7f00000001c0)="3f410839d0d554bb1d598dc380b4afd92ac0034057cd366d6c6116b4c195a80123cd3f1a3103775321d3f51debe633a981eb99ef6a3b9df04fb3c79a9a0ea9f0f5144bbe4b40c1a7c593fc96dc33c4d9e9705cff839154886b05d3502ee4d76b43116c8a900532faa60366d4122038febef5508b3e4a9040efdf14db0698b2e7c7812986fdb7cdb4d2597c4ac7e83d57367cf07dab0c819d171e990bf88ed975730611cefe29956f8d2ecbf2d0b587874a112b5988fb7eb13f5332b227026d71ed5db6dbc54f5b0d6f3d6abf0a21d5d12ff48dae74de01722ac9855f6339d600d15033f8223d2ac51a", 0xe9, 0x2}, {&(0x7f0000000000)="e69459b60edd07a135d90f35e208b97f541c29e60966038eb7c1dc705419ca6ad7136394e0af9290c22bdd60bc", 0x2d, 0x6}, {&(0x7f0000000040)="b4488f0251d85ef60ebcd09b36110bbc5dfa0372bf71326de2f30cd4d40182e5dbf91ee00b9cb17d766128df8b05323aa0f5d8f0d1b603f36c01aba09fc7404a", 0x40, 0x9c}, {&(0x7f00000002c0)="70cff75a944194e2a25fdf70bf52489b1306d10217ba95aa779c91acaee604001ba08383c472c5760b38bbe4c25f0adb20713a5e7a2e140a85858c9ca8910e0ab9773d1115c0f852258933d474f9134b5deaf9785441cdea17f8ee2902c3c766920c76117795444735e093a3818f0c83949316298dc0653e", 0x78, 0x5}, {&(0x7f0000000340)="0d22c8f455cec6666ef0c0e387b4f63df400b9bd2cc7c0c09f119bcf8308cca961166a926ca9e7c593ed8f6a214b1b368bb1350973f9142f", 0x38, 0x5c4}], 0x0, 0x0) [ 888.197188] XFS (loop0): Invalid superblock magic number 01:48:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{0x0}], 0x8000, 0x0) 01:48:04 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:04 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x2) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x2c) ioctl$VT_DISALLOCATE(r1, 0x5608) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20c201, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 888.297242] FAULT_INJECTION: forcing a failure. [ 888.297242] name failslab, interval 1, probability 0, space 0, times 0 [ 888.330199] CPU: 0 PID: 11020 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 888.338121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.347488] Call Trace: [ 888.350090] dump_stack+0x1b2/0x283 [ 888.353736] should_fail.cold+0x10a/0x154 [ 888.357897] should_failslab+0xd6/0x130 [ 888.361877] kmem_cache_alloc+0x28e/0x3c0 [ 888.366032] __d_alloc+0x2a/0x9b0 [ 888.369494] ? lock_downgrade+0x6e0/0x6e0 [ 888.373651] __shmem_file_setup.part.0+0xcb/0x3c0 [ 888.378502] ? shmem_rename2+0x6e0/0x6e0 [ 888.382566] ? __alloc_fd+0x1bf/0x490 [ 888.386378] SyS_memfd_create+0x1f6/0x3a0 [ 888.390535] ? shmem_fcntl+0x120/0x120 [ 888.394427] ? SyS_clock_settime+0x1a0/0x1a0 [ 888.398839] ? do_syscall_64+0x4c/0x640 [ 888.402851] ? shmem_fcntl+0x120/0x120 [ 888.406746] do_syscall_64+0x1d5/0x640 [ 888.410646] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 888.415837] RIP: 0033:0x45ca59 [ 888.419025] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 888.426741] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 888.434015] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 888.441290] RBP: 000000000078bf00 R08: 0000000000008000 R09: 0000000000000001 [ 888.448562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 888.455833] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 [ 888.497632] XFS (loop0): Mounting V4 Filesystem 01:48:04 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 888.539233] XFS (loop0): totally zeroed log [ 888.546669] XFS (loop0): failed to read root inode 01:48:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{0x0}], 0x8000, 0x0) [ 888.616796] FAULT_INJECTION: forcing a failure. [ 888.616796] name failslab, interval 1, probability 0, space 0, times 0 [ 888.670173] CPU: 0 PID: 11054 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 888.678091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.687456] Call Trace: [ 888.690058] dump_stack+0x1b2/0x283 [ 888.693702] should_fail.cold+0x10a/0x154 [ 888.697857] should_failslab+0xd6/0x130 [ 888.701838] kmem_cache_alloc+0x28e/0x3c0 [ 888.705998] ? shmem_destroy_callback+0xa0/0xa0 [ 888.710675] shmem_alloc_inode+0x18/0x40 [ 888.714743] ? shmem_destroy_callback+0xa0/0xa0 [ 888.719415] alloc_inode+0x5d/0x170 [ 888.723057] new_inode_pseudo+0x14/0xe0 [ 888.727042] new_inode+0x1b/0x40 [ 888.730414] shmem_get_inode+0x74/0x780 [ 888.734401] __shmem_file_setup.part.0+0x104/0x3c0 [ 888.739336] ? shmem_rename2+0x6e0/0x6e0 [ 888.743399] ? __alloc_fd+0x1bf/0x490 [ 888.747210] SyS_memfd_create+0x1f6/0x3a0 [ 888.751361] ? shmem_fcntl+0x120/0x120 [ 888.755253] ? SyS_clock_settime+0x1a0/0x1a0 [ 888.759672] ? do_syscall_64+0x4c/0x640 [ 888.763647] ? shmem_fcntl+0x120/0x120 [ 888.767543] do_syscall_64+0x1d5/0x640 [ 888.771441] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 888.776634] RIP: 0033:0x45ca59 [ 888.779825] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 888.787530] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 888.794799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 888.802067] RBP: 000000000078bf00 R08: 0000000000008000 R09: 0000000000000001 [ 888.809333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 888.816604] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x289}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0x4, "a5634fe7"}, &(0x7f0000000080)=0x28) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r2}, @NL80211_ATTR_PID={0x8, 0x52, r3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_PID={0x8, 0x52, r4}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) [ 889.036021] XFS (loop0): Mounting V4 Filesystem [ 889.047176] XFS (loop0): totally zeroed log [ 889.058903] XFS (loop0): failed to read root inode 01:48:05 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 889.236002] FAULT_INJECTION: forcing a failure. [ 889.236002] name failslab, interval 1, probability 0, space 0, times 0 [ 889.267459] CPU: 1 PID: 11117 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 889.275387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.284750] Call Trace: [ 889.287364] dump_stack+0x1b2/0x283 [ 889.291010] should_fail.cold+0x10a/0x154 [ 889.295175] should_failslab+0xd6/0x130 [ 889.299159] kmem_cache_alloc+0x28e/0x3c0 [ 889.303325] selinux_inode_alloc_security+0xb1/0x2a0 [ 889.308450] security_inode_alloc+0x8f/0xd0 [ 889.312782] inode_init_always+0x576/0xb10 [ 889.317027] alloc_inode+0x7a/0x170 [ 889.320657] new_inode_pseudo+0x14/0xe0 [ 889.324637] new_inode+0x1b/0x40 [ 889.328018] shmem_get_inode+0x74/0x780 [ 889.332064] __shmem_file_setup.part.0+0x104/0x3c0 [ 889.337003] ? shmem_rename2+0x6e0/0x6e0 [ 889.341066] ? __alloc_fd+0x1bf/0x490 [ 889.344906] SyS_memfd_create+0x1f6/0x3a0 [ 889.349077] ? shmem_fcntl+0x120/0x120 [ 889.352976] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.357502] ? do_syscall_64+0x4c/0x640 [ 889.361488] ? shmem_fcntl+0x120/0x120 [ 889.365384] do_syscall_64+0x1d5/0x640 [ 889.369283] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.374472] RIP: 0033:0x45ca59 [ 889.377661] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 889.385486] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 889.392764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 889.400040] RBP: 000000000078bf00 R08: 0000000000008000 R09: 0000000000000001 [ 889.407402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 889.414679] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) 01:48:05 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 889.575742] XFS (loop0): Mounting V4 Filesystem [ 889.588837] XFS (loop0): totally zeroed log [ 889.604554] FAULT_INJECTION: forcing a failure. [ 889.604554] name failslab, interval 1, probability 0, space 0, times 0 [ 889.606002] XFS (loop0): failed to read root inode [ 889.668073] CPU: 1 PID: 11144 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 889.676003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.685368] Call Trace: [ 889.687976] dump_stack+0x1b2/0x283 [ 889.691619] should_fail.cold+0x10a/0x154 [ 889.695781] should_failslab+0xd6/0x130 [ 889.699883] kmem_cache_alloc+0x28e/0x3c0 [ 889.704043] get_empty_filp+0x86/0x3e0 [ 889.707943] alloc_file+0x23/0x440 [ 889.711493] __shmem_file_setup.part.0+0x198/0x3c0 [ 889.716433] ? shmem_rename2+0x6e0/0x6e0 [ 889.720497] ? __alloc_fd+0x1bf/0x490 [ 889.724330] SyS_memfd_create+0x1f6/0x3a0 [ 889.728495] ? shmem_fcntl+0x120/0x120 [ 889.732394] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.736813] ? do_syscall_64+0x4c/0x640 [ 889.740794] ? shmem_fcntl+0x120/0x120 [ 889.744691] do_syscall_64+0x1d5/0x640 [ 889.748598] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.753796] RIP: 0033:0x45ca59 [ 889.756986] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 889.764698] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 889.771972] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 889.779246] RBP: 000000000078bf00 R08: 0000000000008000 R09: 0000000000000001 [ 889.786521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 889.793796] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) [ 889.922841] XFS (loop0): Mounting V4 Filesystem [ 889.928128] XFS (loop0): AIL initialisation failed: error -12 [ 889.955050] XFS (loop0): log mount failed 01:48:05 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 890.068479] FAULT_INJECTION: forcing a failure. [ 890.068479] name failslab, interval 1, probability 0, space 0, times 0 [ 890.092313] CPU: 0 PID: 11172 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 890.100235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.109596] Call Trace: [ 890.112196] dump_stack+0x1b2/0x283 [ 890.115838] should_fail.cold+0x10a/0x154 [ 890.120007] should_failslab+0xd6/0x130 [ 890.123998] kmem_cache_alloc+0x28e/0x3c0 [ 890.128163] selinux_file_alloc_security+0xaf/0x190 [ 890.133193] security_file_alloc+0x66/0xa0 [ 890.137440] ? selinux_is_enabled+0x5/0x50 [ 890.141688] get_empty_filp+0x15c/0x3e0 [ 890.145762] alloc_file+0x23/0x440 [ 890.149315] __shmem_file_setup.part.0+0x198/0x3c0 [ 890.154253] ? shmem_rename2+0x6e0/0x6e0 [ 890.158319] ? __alloc_fd+0x1bf/0x490 [ 890.162135] SyS_memfd_create+0x1f6/0x3a0 [ 890.166294] ? shmem_fcntl+0x120/0x120 [ 890.170188] ? SyS_clock_settime+0x1a0/0x1a0 [ 890.174602] ? do_syscall_64+0x4c/0x640 [ 890.178586] ? shmem_fcntl+0x120/0x120 [ 890.182483] do_syscall_64+0x1d5/0x640 [ 890.186384] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 890.191577] RIP: 0033:0x45ca59 [ 890.194768] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 890.202486] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 890.209761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bb1 01:48:06 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) fdatasync(r0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x1b, "30347725e142bed4269aa802eb23b6f7003cfd69e9f102c06409b8"}, &(0x7f0000000080)=0x38) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x23) [ 890.217038] RBP: 000000000078bf00 R08: 0000000000008000 R09: 0000000000000001 [ 890.224312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 890.231591] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000000000001000"/31, 0x1f}], 0x8000, 0x0) 01:48:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) [ 890.393057] XFS (loop0): Mounting V4 Filesystem [ 890.406372] XFS (loop0): totally zeroed log [ 890.418152] XFS (loop0): failed to read root inode 01:48:06 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = getuid() setfsuid(r0) [ 890.587975] FAULT_INJECTION: forcing a failure. [ 890.587975] name failslab, interval 1, probability 0, space 0, times 0 [ 890.637236] CPU: 0 PID: 11225 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 890.645162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.654524] Call Trace: [ 890.657127] dump_stack+0x1b2/0x283 [ 890.660873] should_fail.cold+0x10a/0x154 [ 890.665043] should_failslab+0xd6/0x130 [ 890.669148] kmem_cache_alloc+0x28e/0x3c0 [ 890.673312] getname_flags+0xc8/0x550 [ 890.677132] do_sys_open+0x202/0x3e0 [ 890.680860] ? filp_open+0x60/0x60 [ 890.684411] ? fput+0xb/0x140 [ 890.687523] ? do_syscall_64+0x4c/0x640 [ 890.691503] ? do_sys_open+0x3e0/0x3e0 [ 890.695400] do_syscall_64+0x1d5/0x640 [ 890.699303] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 890.704496] RIP: 0033:0x416851 [ 890.707688] RSP: 002b:00007f07ae544a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 890.715419] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 0000000000416851 [ 890.722695] RDX: 00007f07ae544b0a RSI: 0000000000000002 RDI: 00007f07ae544b00 [ 890.729974] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 01:48:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) dup(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x4, "79af5406"}, &(0x7f0000000080)=0x28) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, r5, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x4008810) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8044}, 0x404c005) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:06 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 890.737373] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 890.744647] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 [ 890.803283] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11245 comm=syz-executor.5 [ 890.816721] XFS (loop0): Mounting V4 Filesystem [ 890.824795] FAULT_INJECTION: forcing a failure. [ 890.824795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 890.836636] CPU: 0 PID: 11251 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 890.844518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.853880] Call Trace: [ 890.856481] dump_stack+0x1b2/0x283 [ 890.860125] should_fail.cold+0x10a/0x154 [ 890.864285] ? lock_acquire+0x170/0x3f0 [ 890.868273] __alloc_pages_nodemask+0x22b/0x2730 [ 890.873051] ? perf_trace_lock+0x109/0x4b0 [ 890.877299] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 890.882149] ? check_preemption_disabled+0x35/0x240 [ 890.887181] ? perf_trace_lock_acquire+0x4b0/0x4b0 [ 890.892737] ? HARDIRQ_verbose+0x10/0x10 [ 890.896808] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 890.903479] ? setattr_copy+0x143/0x550 [ 890.907460] cache_grow_begin+0x91/0x410 [ 890.911530] cache_alloc_refill+0x28c/0x360 [ 890.915864] kmem_cache_alloc+0x333/0x3c0 [ 890.920019] getname_flags+0xc8/0x550 [ 890.923827] do_sys_open+0x202/0x3e0 [ 890.927548] ? filp_open+0x60/0x60 [ 890.931094] ? fput+0xb/0x140 [ 890.934203] ? do_syscall_64+0x4c/0x640 [ 890.938185] ? do_sys_open+0x3e0/0x3e0 [ 890.942078] do_syscall_64+0x1d5/0x640 [ 890.945979] entry_SYSCALL_64_after_hwframe+0x46/0xbb 01:48:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) [ 890.951168] RIP: 0033:0x416851 [ 890.954354] RSP: 002b:00007f07ae544a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 890.962065] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 0000000000416851 [ 890.969337] RDX: 00007f07ae544b0a RSI: 0000000000000002 RDI: 00007f07ae544b00 [ 890.976607] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 890.983879] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 890.991151] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 [ 891.011316] XFS (loop0): totally zeroed log [ 891.018429] XFS (loop0): failed to read root inode [ 891.133467] XFS (loop5): SB sanity check failed [ 891.141983] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:07 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) [ 891.196951] XFS (loop5): Unmount and run xfs_repair 01:48:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 891.226714] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 891.244771] FAULT_INJECTION: forcing a failure. [ 891.244771] name failslab, interval 1, probability 0, space 0, times 0 [ 891.264332] ffff88809586a000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 891.316412] CPU: 0 PID: 11305 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 891.324356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.333804] Call Trace: [ 891.336400] dump_stack+0x1b2/0x283 [ 891.340038] should_fail.cold+0x10a/0x154 [ 891.344202] should_failslab+0xd6/0x130 [ 891.344802] ffff88809586a010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 891.348175] kmem_cache_alloc+0x28e/0x3c0 [ 891.361172] get_empty_filp+0x86/0x3e0 [ 891.365074] path_openat+0x87/0x2aa0 [ 891.367619] ffff88809586a020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 891.368789] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 891.382098] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 891.386600] ? kmem_cache_alloc+0x124/0x3c0 [ 891.387894] ffff88809586a030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 891.390918] ? getname_flags+0xc8/0x550 [ 891.390926] ? do_sys_open+0x202/0x3e0 [ 891.390938] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.390951] ? path_mountpoint+0x960/0x960 [ 891.390966] ? perf_trace_lock+0x109/0x4b0 [ 891.390981] do_filp_open+0x18e/0x250 [ 891.390995] ? may_open_dev+0xe0/0xe0 [ 891.391006] ? __alloc_fd+0x1bf/0x490 [ 891.391019] ? lock_acquire+0x170/0x3f0 [ 891.391028] ? lock_downgrade+0x6e0/0x6e0 [ 891.391044] ? do_raw_spin_unlock+0x164/0x250 [ 891.391054] ? __alloc_fd+0x1bf/0x490 [ 891.391073] do_sys_open+0x292/0x3e0 [ 891.391085] ? filp_open+0x60/0x60 [ 891.391096] ? fput+0xb/0x140 [ 891.391108] ? do_syscall_64+0x4c/0x640 [ 891.391115] ? do_sys_open+0x3e0/0x3e0 [ 891.391128] do_syscall_64+0x1d5/0x640 [ 891.391146] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.391155] RIP: 0033:0x416851 [ 891.391161] RSP: 002b:00007f07ae544a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 891.391173] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 0000000000416851 [ 891.391178] RDX: 00007f07ae544b0a RSI: 0000000000000002 RDI: 00007f07ae544b00 [ 891.391185] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 01:48:07 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 891.391196] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 891.391202] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 [ 891.543508] XFS (loop5): SB validate failed with error -117. 01:48:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000000000001000", 0x10}], 0x8000, 0x0) [ 891.634598] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11258 comm=syz-executor.5 [ 891.651906] FAULT_INJECTION: forcing a failure. [ 891.651906] name failslab, interval 1, probability 0, space 0, times 0 01:48:07 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$AUDIT_USER(r2, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="9c000000ed03020027bd7000fcdbdf259ed914c49f4be05c4ae564794cb0c9942ff349b25ee9fe19ebffd11a6bcd44b1fb9ed8c6a43fe870dd5377491a684e5e11d53a81173652f66c5415dd868384adbe2c27053d9595c92b00840c24b4b33b255b03325fed57a93407c4a1e4dbc3105a7e390a56fa8b15d788149ba76492d3882f07c57defe597cc8e8e0765d51bd46bf5e3bd7ade124012a3db40e7026f118fe484d8093f2fe9a4854fe72a0613432def014c909aa526493d54eaf9242ae192fa6b9a66914b0ddabe9e9b381630c767c66124dda4fb4964ad336751b43958f6ff12542fd25869a4dfcf126c4f025e02f129e4a9920dea6d99afbe61280c2060c59684722ce331dd5fd72332af9224d968bfa9df2822bbe68576fb8db954dc2148a3c3b1bdf28da70d08f1aa35338650193947417f0f15cf309712bcdb001745fdbaf143ce446b3eba7ec8751877f60fed760e5b339704"], 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x401, 0x0) dup(r3) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000300)={0x1f}, 0x1) r4 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x6f4}, 0x1, 0x0, 0x0, 0x4000004}, 0x80c0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696ceb9472000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x5, 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="f59d00000000000085100000feffffff0e50365f73110000000000001fe2f6ff00000000e09706c5f2cbc90c29001dc2f009c35f8d79251b3306ba7ee54c2e6a04161bef8b8abe3d2f43a76a424777f6e6ae6bf737646e02f90e766be70bb74b0e321bb328c69d9d848452d2bebdbfcfd466472d34332335d927694ce2cef960e78a02ba3c8bb217f962e9955cbb852855d0e67627a19f776327148f421d13c20ae155fc10d885b2baff986686ac1cc0a8c22b3161916c3d07c38769a0382a5a331af217afbf3d04fc949c3a005b73362c5d4e8739dc7351c07094ba1d10396eb5f1fe50b39c531eb2d59e2e25660f08f4ef1a69b205d894753ccfd4d1a8b41364a8875bd9dbfb918cee73998d778100000000"], &(0x7f0000000240)='GPL\x00', 0x8, 0x3c, &(0x7f0000000480)=""/60, 0x41000, 0x7, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xd, 0x1, 0x6}, 0x10, 0x0, r6}, 0x78) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 891.706141] XFS (loop0): Mounting V4 Filesystem [ 891.707085] CPU: 1 PID: 11334 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 891.718753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.728120] Call Trace: [ 891.730717] dump_stack+0x1b2/0x283 [ 891.734355] should_fail.cold+0x10a/0x154 [ 891.738600] should_failslab+0xd6/0x130 [ 891.742579] kmem_cache_alloc+0x28e/0x3c0 [ 891.746735] selinux_file_alloc_security+0xaf/0x190 [ 891.751760] security_file_alloc+0x66/0xa0 [ 891.756004] ? selinux_is_enabled+0x5/0x50 [ 891.760249] get_empty_filp+0x15c/0x3e0 [ 891.764406] path_openat+0x87/0x2aa0 [ 891.768127] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 891.772629] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 891.777135] ? kmem_cache_alloc+0x124/0x3c0 [ 891.781462] ? getname_flags+0xc8/0x550 [ 891.785436] ? do_sys_open+0x202/0x3e0 [ 891.789330] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.794709] ? path_mountpoint+0x960/0x960 [ 891.798957] ? perf_trace_lock+0x109/0x4b0 [ 891.803224] do_filp_open+0x18e/0x250 [ 891.807036] ? may_open_dev+0xe0/0xe0 [ 891.810842] ? __alloc_fd+0x1bf/0x490 [ 891.814663] ? lock_acquire+0x170/0x3f0 [ 891.818643] ? lock_downgrade+0x6e0/0x6e0 [ 891.822921] ? do_raw_spin_unlock+0x164/0x250 [ 891.827425] ? __alloc_fd+0x1bf/0x490 [ 891.831273] do_sys_open+0x292/0x3e0 [ 891.834995] ? filp_open+0x60/0x60 [ 891.838544] ? fput+0xb/0x140 [ 891.841659] ? do_syscall_64+0x4c/0x640 [ 891.845633] ? do_sys_open+0x3e0/0x3e0 [ 891.849530] do_syscall_64+0x1d5/0x640 [ 891.853431] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.858624] RIP: 0033:0x416851 [ 891.861816] RSP: 002b:00007f07ae544a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 891.869528] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 0000000000416851 [ 891.876825] RDX: 00007f07ae544b0a RSI: 0000000000000002 RDI: 00007f07ae544b00 [ 891.884101] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 891.891381] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 891.898666] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00Z\x00\x00', @ANYRES16=0x0, @ANYBLOB="010028bd9000fddbdf250100060001104e240099f043a1de00000000000045"], 0x24}, 0x1, 0x0, 0x0, 0x2000c0a0}, 0x8001) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x840, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x800, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000001c0)=""/211, &(0x7f0000000100)=0xd3) [ 891.921465] XFS (loop0): totally zeroed log [ 891.926642] XFS (loop0): failed to read root inode 01:48:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000100)=ANY=[@ANYBLOB="0004010500000000fc0000000000000000000000000000000000027f9f54d910cedbe91ec8815297a71c6922798ac183de6f442e9936ab6e1e7864553af5e08ac330b3e46220a5d314e1c1ab4fdbd05a3bf0a763eead43afac632215"], 0x28) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)=0x2, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000000)=[{&(0x7f0000000280)="cf64706f0d6dfb800a31a7ab5f65ec0c4ffe4308a21578dae7a8d916b99b1d52ff65f8a032009ad939d885bc1bceedfab29791b0b121f5842494ef94f159fd3b919ecbce92f0b897d14cff856fe45f099182a700f2061b10e0fb7da284a9f429982f12a02d24fcfd28ca79fb317f6478696437b61f9076eab0f8c02f05016621426cc595abad7674c2ad1619a3cc4752b98fbdb249af6a3688a7b3e41c2ee29ef4001d7d626f2cce69542c0bac18be8a89f1b6e2da2292dade8af94efc6f312c7b90c30ef48e5235f7a4459a1fd352499f9dd7f1f8e6813da7e3c84a080c8eaf93e38482fd10682f726ddfdcee16ae267d1107447128ea4b", 0xf8, 0x5}], 0x201020, 0x0) 01:48:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='X', 0x1}], 0x8000, 0x0) 01:48:07 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x36}], 0x38ad000, 0x0) 01:48:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000, 0x2, &(0x7f0000000000)=[{&(0x7f00000000c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x1}, {0x0, 0x0, 0x4}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000140)=0x12, 0x4) r3 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r3, 0x4122, 0x0) 01:48:08 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = fcntl$dupfd(r0, 0x406, r2) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000000)=0x9, 0x4) [ 892.208007] XFS (loop5): SB sanity check failed [ 892.216234] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 892.260785] XFS (loop5): Unmount and run xfs_repair [ 892.276509] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 892.283446] FAULT_INJECTION: forcing a failure. [ 892.283446] name failslab, interval 1, probability 0, space 0, times 0 [ 892.294576] ffff888095f91000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 892.338465] CPU: 1 PID: 11410 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 892.346383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.355746] Call Trace: [ 892.356153] ffff888095f91010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 892.358339] dump_stack+0x1b2/0x283 [ 892.358358] should_fail.cold+0x10a/0x154 [ 892.375042] should_failslab+0xd6/0x130 [ 892.379028] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 892.383711] ? loop_get_status64+0x100/0x100 [ 892.388128] __kthread_create_on_node+0xbe/0x3a0 [ 892.393066] ? kthread_park+0x130/0x130 [ 892.397047] ? perf_trace_lock_acquire+0x4b0/0x4b0 [ 892.401418] ffff888095f91020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 892.401985] ? __fget+0x1ff/0x360 [ 892.401999] ? loop_get_status64+0x100/0x100 [ 892.418659] kthread_create_on_node+0xa8/0xd0 [ 892.423160] ? __kthread_create_on_node+0x3a0/0x3a0 [ 892.425257] ffff888095f91030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 892.428283] ? __lockdep_init_map+0x100/0x560 [ 892.428295] ? __lockdep_init_map+0x100/0x560 [ 892.428313] lo_ioctl+0xca9/0x1c00 [ 892.449651] ? loop_clr_fd+0xac0/0xac0 [ 892.452807] XFS (loop5): SB validate failed with error -117. [ 892.453536] blkdev_ioctl+0x91d/0x17c0 [ 892.463197] ? blkpg_ioctl+0x8d0/0x8d0 [ 892.467105] block_ioctl+0xd9/0x120 [ 892.470738] ? blkdev_fallocate+0x3a0/0x3a0 [ 892.475061] do_vfs_ioctl+0x75a/0xfe0 [ 892.478871] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 892.484502] ? ioctl_preallocate+0x1a0/0x1a0 [ 892.488925] ? security_file_ioctl+0x76/0xb0 [ 892.493334] ? security_file_ioctl+0x83/0xb0 [ 892.497745] SyS_ioctl+0x7f/0xb0 [ 892.501112] ? do_vfs_ioctl+0xfe0/0xfe0 [ 892.505093] do_syscall_64+0x1d5/0x640 [ 892.508989] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 892.514180] RIP: 0033:0x45c927 [ 892.517366] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 892.525079] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045c927 [ 892.532355] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 892.539634] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 892.546936] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 892.554238] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='X', 0x1}], 0x8000, 0x0) 01:48:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={&(0x7f00000001c0)="77c2d926894556209c2e036f3c84918460d22386498fb5163755c5196d7db564e3b001a4048098906453a0a2c2975af03967fde2aef3dac5124440c5523c9c9e7be41131b6b189b2bfeacba970bdf0b15881cc3f32bb1045e317fc0aabca7039b02c0c893e40ac6d669a2097a1ed5b7c328df348962fe6e9f5c3f9a4fae4a4c1d4b4b044eda600da0d672bfec50d19f8fb1ea5287b1070434118", &(0x7f0000000280)=""/216, &(0x7f0000000380)="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", &(0x7f0000001380)="1d739ccfa32ebf1da021f90e3baaa506b5b6bcca1c25611be9dc660744bd0d3b8b6639c3be2c3d4ba4a5961843f67b278dc52fad1b5ead34e55645ced8508462ad3a291784f1f6d9fe2065955b844988cc1ed471cc5552246efccdd8d93ae48da203b274fdb135b7fa7338f3796f3f33f68685a2855af15a549d3007d4ee30f7807eaa87d1a757520218f06d2e37b638e85b1d8c1a39e4050cccb7dae915f4a2bfc44564eac5a8eeaf9f02fa5d2e919b206e242948960d829f3bdccb9633311e5f6f3c6143299b086245fb7eba66d6d8604cc76cb630192651b3ec835254c99f322c9214906d354b6043363357def006abd1fe859b3eee0bc07f1676", 0x6, r2, 0x4}, 0x38) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 892.632552] XFS (loop0): Invalid superblock magic number 01:48:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_LINK(r1, 0x40044160, &(0x7f0000000000)=0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$rose(r3, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x100004, 0x0) 01:48:08 executing program 1: exit_group(0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x300, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000100)={0x101, "a315913ff81e1607c000ce876101008cb79360eacc0375635963345bd6a0e1f3", 0x3}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="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", 0x143, 0x9}], 0x102e229, 0x0) 01:48:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x80, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040)=0xfffffffc, 0x4) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x1450, 0x0) 01:48:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000021a91cd73995081700000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200040000040000000000000000", 0x7c}], 0x0, 0x0) 01:48:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='X', 0x1}], 0x8000, 0x0) 01:48:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x80, 0x0, &(0x7f0000000000), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x40, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@cache_fscache='cache=fscache'}, {@timeout={'timeout', 0x3d, 0x3}}, {@common=@noextend='noextend'}, {@rq={'rq', 0x3d, 0x1f}}, {@timeout={'timeout', 0x3d, 0x80c}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'rq'}}, {@euid_lt={'euid<', r0}}, {@audit='audit'}]}}) 01:48:08 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="93b2000000000000000001"], 0x38}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x30, r1, 0x300, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x8800) 01:48:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x3f2, 0x8, 0x70bd2d, 0x25dfdbfc, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10000040}, 0x200448d0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 893.031160] FAULT_INJECTION: forcing a failure. [ 893.031160] name failslab, interval 1, probability 0, space 0, times 0 [ 893.064976] CPU: 1 PID: 11512 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 893.072902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.082261] Call Trace: [ 893.084864] dump_stack+0x1b2/0x283 [ 893.088508] should_fail.cold+0x10a/0x154 [ 893.092679] should_failslab+0xd6/0x130 [ 893.096664] kmem_cache_alloc+0x28e/0x3c0 [ 893.100823] __kernfs_new_node+0x6f/0x470 [ 893.104986] kernfs_new_node+0x7b/0xe0 [ 893.108880] __kernfs_create_file+0x3d/0x320 [ 893.113295] sysfs_add_file_mode_ns+0x1e1/0x450 [ 893.117974] internal_create_group+0x23b/0x7e0 [ 893.122580] lo_ioctl+0x1108/0x1c00 [ 893.126649] ? loop_clr_fd+0xac0/0xac0 [ 893.130551] blkdev_ioctl+0x91d/0x17c0 [ 893.134441] ? blkpg_ioctl+0x8d0/0x8d0 [ 893.138349] block_ioctl+0xd9/0x120 [ 893.142079] ? blkdev_fallocate+0x3a0/0x3a0 [ 893.146411] do_vfs_ioctl+0x75a/0xfe0 [ 893.150218] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 893.155849] ? ioctl_preallocate+0x1a0/0x1a0 [ 893.160278] ? security_file_ioctl+0x76/0xb0 [ 893.164693] ? security_file_ioctl+0x83/0xb0 [ 893.169115] SyS_ioctl+0x7f/0xb0 [ 893.172481] ? do_vfs_ioctl+0xfe0/0xfe0 [ 893.176468] do_syscall_64+0x1d5/0x640 [ 893.180369] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 893.185559] RIP: 0033:0x45c927 [ 893.188746] RSP: 002b:00007f07ae544a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 893.196460] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045c927 [ 893.203741] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 893.211050] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 893.218334] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 01:48:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x3fffffc, 0x0, &(0x7f00000000c0), 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000000)={0xd, 0x546}) [ 893.225613] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f07ae5456d4 01:48:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000", 0x9}], 0x8000, 0x0) [ 893.271850] XFS (loop0): Invalid superblock magic number 01:48:09 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000000)={{0x98, @remote, 0x4e23, 0x1, 'ovf\x00', 0x28, 0xffffffff, 0x5c}, {@broadcast, 0x4e21, 0x2, 0x49c, 0x8, 0xa36e}}, 0x44) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 893.327626] XFS (loop5): SB sanity check failed [ 893.335854] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x25511f92, 0x220200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010006000000000000001b00000008009a000200d2"], 0x1c}}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$vsock_stream(r4, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @host}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="3000000010000108fcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000016e8bc4d12385935", @ANYRES32=r7, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x8}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_STA_FLAGS={0x8, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_ASSOCIATED={0x4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000) exit_group(0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20020840}, 0x20000801) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f0000000040)="f49d33608c643af443f52afb29a07808feea", 0x12, 0x8}], 0x0, 0x0) [ 893.394934] XFS (loop5): Unmount and run xfs_repair 01:48:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendto$llc(r1, &(0x7f00000001c0)="b5bc27ccbf34bc4ab836312ed34c4da514a53e02c38a35fcefb6e85b1db0dc288b694a028c1e0d7173d18110a7cf808a0338b450a7dac1224cabc2f0bc555b24f53aef9dbb898ccf98bfc674e6fb07e2435608d4c5acc9c9e90ece566b425ef57338e209cfbaa588168ffb9e9dbbfb6d98c92f0fe00187c785c6b5a86913e1b6781be33b99127cd81e9f34aed39fbe465732fb5d380cff6b7b1286d166fa582d1dec970f9b6ad6c2b61bff4bb12b763da2fd4c51bb74", 0xb6, 0x4000, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@empty]}) [ 893.415264] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 893.437228] ffff8880a06af000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 893.457252] ffff8880a06af010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 893.488337] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 893.491145] ffff8880a06af020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ptrace$cont(0x18, r0, 0x401, 0x0) exit_group(0x0) [ 893.572842] ffff8880a06af030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 893.609968] XFS (loop5): SB validate failed with error -117. 01:48:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XF', 0x2}], 0x8000, 0x0) [ 893.619455] XFS (loop0): SB sanity check failed [ 893.625828] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x4a837105) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x4b4c, &(0x7f00000000c0)) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x38}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x7}, 0x0, 0x0, 0x9, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3fffffd, 0x0, &(0x7f00000000c0), 0x1080004, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) ioctl$TIOCL_SELLOADLUT(r7, 0x541c, &(0x7f0000000040)={0x5, 0x100000001, 0x505, 0x80000000, 0x5}) [ 893.668531] XFS (loop0): Unmount and run xfs_repair [ 893.687849] XFS (loop0): First 64 bytes of corrupted metadata buffer: 01:48:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000100)={&(0x7f00000001c0)=[0x8000, 0x9, 0xffffffd1, 0x5, 0x40], 0x5, 0x8000, 0x8001, 0x527a, 0xab6, 0x5, 0x3, {0xe2, 0x0, 0x2, 0x6946, 0x1cd7, 0x401, 0x7, 0x2, 0xfffc, 0x7ff, 0x5, 0x8, 0x101, 0xe0, "a8bbb4ab82beeee106bea1d36630b48b71c57876d19af91fcf1b93ae04dc053b"}}) [ 893.737310] ffff88806146f000: 58 46 53 42 00 00 10 00 f4 9d 33 60 8c 64 3a f4 XFSB......3`.d:. [ 893.793862] ffff88806146f010: 43 f5 2a fb 29 a0 78 08 fe ea 00 00 00 00 00 00 C.*.).x......... [ 893.827558] ffff88806146f020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 893.858631] ffff88806146f030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 893.900961] XFS (loop0): SB validate failed with error -117. 01:48:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x1a0, 0x1403, 0x400, 0x70bd25, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_virt_wifi\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6tnl0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'geneve1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bridge0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'xfrm0\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_to_bridge\x00'}}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) 01:48:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="8dbdb7026572000000002022000000000000000000000000b38c0000000000000400e6a2cc00"], &(0x7f0000000080)=0x2c) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x800, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c7467720000000000000020000000000000000004680000a563cfe73563028e759ef6271f34266552671f59537fcaf1d87c09eef09601a923c605539d3ea5f9dc95301b72acf7a7d83f10ddd607b05880f252d4fe8f2613f7318c55dd11e43eaac1b101305457043210f50a7c03f7353ed14c614f7ace011c7a687b99bd965df16b42083d99c1d5c1e0bf9d4f5f3e9c79e08d42fb3e44f9557f277585506711ebecfcdf96fcf34c6947249584a4cc4e7e35bc10a9f66f96fd3d46fa58b92f8c9d2b8b3e4ce478bbd2d579b2fbef7e13cd9cffeb88866899b78058dbc043060c36120222218970a6ca56d0a040273ba9b692230c7450874b2a501e6f14ccc3f67376a7a55e20092a8f16867cb4f2c52906ec56616702bc963dbfa8363c1d87e2cbc650bf4764bc187a3ccb2f95d8cdcf8d8648ec9886cbcf89b59d0d7895075038510b4bf89126c63cd4f0a5a74555d65e317bf58e315234daed6f4a33d78e59b2653c8aee3d18b8b14d766fd345065fee10f0628bef5bc15cfd67cd31e7ecb9fc"], &(0x7f0000000080)=0x2c) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XF', 0x2}], 0x8000, 0x0) 01:48:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDCTL_DSP_NONBLOCK(r1, 0x500e, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x1000000, &(0x7f00000001c0)) 01:48:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x442, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000080)={0x1, 0x81}) [ 894.118316] XFS (loop5): SB sanity check failed [ 894.123442] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 894.170065] XFS (loop5): Unmount and run xfs_repair [ 894.179403] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 894.206167] ffff88809577d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 894.258133] XFS (loop0): Mounting V4 Filesystem [ 894.258555] ffff88809577d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 894.285520] XFS (loop0): totally zeroed log 01:48:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XF', 0x2}], 0x8000, 0x0) [ 894.301699] ffff88809577d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 894.317754] XFS (loop0): failed to read root inode [ 894.347761] ffff88809577d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 894.391316] XFS (loop5): SB validate failed with error -117. 01:48:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x8000, 0x0) 01:48:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x1409, 0x200, 0x70bd27, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x40004800) [ 894.563292] XFS (loop5): SB sanity check failed [ 894.568091] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 894.599706] XFS (loop5): Unmount and run xfs_repair [ 894.604842] XFS (loop5): First 64 bytes of corrupted metadata buffer: 01:48:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB\x00\x00', 0x6}], 0x8000, 0x0) [ 894.619800] ffff8880918d9000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 894.628777] ffff8880918d9010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 894.652321] ffff8880918d9020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:10 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x58, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010101}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, [], 0x20}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000044}, 0x1) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="10002abd7000fddbdf2506000000040001802800018014000400fe880000008000000000000000000101060001000a000000060005004e210000"], 0x40}, 0x1, 0x0, 0x0, 0x404c800}, 0x4000004) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r6, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000038c0)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f00000039c0)=0xe8) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000003b00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000003ac0)={&(0x7f0000003a00)={0x8c, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x20000090) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 894.673770] ffff8880918d9030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 894.695499] XFS (loop5): SB validate failed with error -117. 01:48:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 894.781682] XFS (loop0): Mounting V4 Filesystem 01:48:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFS', 0x3}], 0x8000, 0x0) [ 894.810880] XFS (loop0): totally zeroed log [ 894.817646] XFS (loop0): failed to read root inode 01:48:10 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f0000000280)={0x73, 0x15, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1, @ra={0x5, 0x2, 0x8}, @pad1, @calipso={0x7, 0x38, {0x3, 0xc, 0x20, 0x8, [0x1, 0xfffffffffffffff7, 0x7, 0x9c0, 0x100, 0xb19d]}}, @calipso={0x7, 0x18, {0x2, 0x4, 0x3, 0x0, [0x800, 0x5]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x8, 0x23, "b17359cb16bc3129a1b08f06a5a4a7fb307b08b7d0c81e2bb2da9844ddf0609f7ef5fc"}, @jumbo={0xc2, 0x4, 0x9}, @calipso={0x7, 0x18, {0x3, 0x4, 0x9, 0x1, [0x3ff, 0x7]}}]}, 0xb8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={r3, 0x90, "e52d71b982bd50a4310fc6b11d339b81b77193bf15246542af50be8f470320a8eb1750e679a0489f681535accc11aa23f9408421c724fcb57c342240d0f3fec35a0cdde929018dae19601f4419ec266b818bfba356f75d0f0cdcb51aaf4e9bff0c5bf11e459e77ea1972373ba70357da79e226735dc218eb161bdea33a895f2623084e64cf1024cb88b02a696df74927"}, &(0x7f0000000000)=0x98) 01:48:10 executing program 0: syz_init_net_socket$llc(0x1a, 0x1, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0xf95f, 0x0, 0x0, 0x8000, 0x0) [ 894.945163] XFS (loop5): SB sanity check failed [ 894.950725] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 894.988641] XFS (loop5): Unmount and run xfs_repair 01:48:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFS', 0x3}], 0x8000, 0x0) 01:48:10 executing program 1: clone(0x20002000ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3ffffff, 0x9, &(0x7f0000001700)=[{&(0x7f0000000140)="584653420000100000000000000010000000000000000000000000000000000000000001000000b6ad26c597eb4f5c1900000000000000040000000000000d8800000000e934c7f46e710040000d890009000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x83, 0x1}, {&(0x7f0000000200)="9e3a5ae34a34f6670a3fa9ecf2fe873ff9b623312563cb13b7da98a567d5947649a856b8842d5769308179a7f07ec2ed3e0249fd89a5e2af4faa3130ce8f53fff11ccbaf540224ff844620ac1eaf7dc3e9d1c77ce806b582531f6020cb1136a4263ff2c6835c6f6ca527df4a7cc0be379b44f8431f5f965d0db139be329d9bee680adea4c3f23543e24441b9ffcf20dc3b4e8d1ccf8aba1820e6", 0x9a, 0x86}, {&(0x7f00000002c0)="e2caaf6ebced2a3c67170fa514e30d0f08e5d81714153adc4c5747da17d68dddb9e499d5081d0c3905bc605e0cb0798f24f0d7e9815473b22d302b38670500fb25da7adffb6784898cb475b571b55b07f8a8b5573ec7b2888919022f85d9170ba493df7d458bbfafdd6c2529998e", 0x6e, 0x9}, {&(0x7f0000000340)="c3a7fb84a2c00577b3ec8e3abc50344bb80569ed46892dccf4b2a8eb8452f4e3ee3a6df9283a7c8346f467afc62b74e24a7f322579b817a5dafe493e79f46862e96e4e364272e7acea97b71ff52c919e045ce6a4386c44d71501848def95f6791e31eed1e1952956aaa53128e52a088ccc3d5cca50cbb89621a0e000786bfcf1f2f363dd755a1cffd3fcc3d6780ae08e1a6ea324c850a2a1f63d3356ef55e3807525ed05b81176df5b410803b8810253168829dafb572723269c12a51abbece355bdb9659922e839", 0xc8, 0x1}, {&(0x7f0000000440)="f016b2e9211ca52569759ac4b055e9558a63e0ffcdd111db77909c8cc8d95c2af9c348a03acbf7382e0596626afab803279a40c96a29e72ad093f1370864594deabdfe551098bad87a0329ed786f8445a2bdb933db1abf8dbb5d33849d3a0e25ec06ea7169f8f5a5e1b2e9ec5d198f0abcc148e4f9c1af52b5df34e19372705b72a2935a4135cab2e1620ec8dc83c04049799c024e7acce38d806cb908ba46ff26fa98d9df4fa3826758f4a2bbcec7da5837fe6e2b59a4cbaab3ec5034039c6a8137129f818df31d06d19a", 0xcb, 0x9}, {&(0x7f0000000540)="7b8f6f35fff5c9e0e804b7b25fc288a7547069c676481124548427624fdf10054f465b779745902d0541d59850fece289777b935bafe23887a0e95a2db74ecd7fb9379103fbcd007e37d8e5fc3a542b49f4717dd7625bf859fa472a0f1713f34a095f781a50e0fbbe2504704cfc12133d34686ca88f3da4a231527df4edba25d702b853bd122dd7aff4fc7f24e7fad264746e751d0314216652c2c53924cec9e8f748b6c277b7ef8bd8e803d96", 0xad, 0x81}, {&(0x7f0000000600)="e0f0c01e0938b7381e199e17fd013a4165cdf149852db70cf84ee28a48d8a898d74028583e5aaf29ed6167910119cb27c85cbfa469e742aa24d76923e7e37049a5a8fc2bca286bff53", 0x49, 0x1}, {&(0x7f0000000680)="089d89ba6ed86ecd9091941fc7db7ad70bca6475f34ca8d8e1ba962551ffefccf3b7567d69516bdbab4d621a9627302e67300e05b9409541f0c28b74ed1351bad11f4c5087a082698f5b7a1f5bcab2e0b20d3b396ce443431a68a2a40028535681008da35df3a24487c75d7a904ea9c935accd876b02f0b317deec39e0a8b2c2dfcc103b3784aa3ef1554792482b603b97773eafa4b047d9e28d251417f92c47c1dea32d05887d8b10343eca4082a55680155b28883840be6ed645db4f3849bbddd227c9826386a2f61c6faeb0b8d9b4458fbb69b8097359c9b282bda5086563f60bc4c5924c809b2fd7d2d18af7beadd9b2481dbdf8f2ff6b6dbc63e597362629d98a8f9e3a84dda1e74ac67daca656031666663d2e18b7462d93e29a94bf085777846d30394bced379937574f4825625e859114b312cc313a9bb8d733af2dae15381420956aa167803620d02e031588b6c98f72db62db7160aeae9555bbf7bc09b12f2ebcba6cceb6ed80c6a7670657ad684b505acd2b24ad70db8f1279439f63aeda220bb00bfdbae55a56f9aa6d64a59dba6dd12f89716ede8c0a287e731427bf4cc0f67568a8d81d53cf18d1febcc618315cdf6f9bcbfb0ca364ce691b4116266a22d58fa62f1421ccca6d82b240500e74ea8d03e29006648f4e981dbb62e44de825c0788208010f8690e7539a77a5c37f01924986c39bf4c5e3db2723da59640c85b54cc877adc940e82cfe01716e9f793c85673a2f740ff48c8b8ed0c24f45feb94f43a100629b7dcba422c96487fcfc2c8df63382f3a0a958e401c4bb3e58cc3f98edb509b7dcda371e4839782dd7f4b6b7455fe06fe4b4401778139f5152607cf9c84be48aa2ab2c5d032ca462511053f93a387868194290c5a43641cd053ee0771887effacf1a4df2155fb6a0540a7e2b5fcf182672342b9c15478f696aa6247607b88f2900d448b55679a3e7db460b152aa70f23026d56545e4a0ec5a04e009703b80841c2b5a85f5afc760dfead1a41e0c1140dd7bfc74599a0bf0163b1fd2530f307e47f891204abd732e6df48233a3e06baea6250f633bbcfb861d893d7896b0a8a178898ce1e208f25200bfc9019c123b5ec0b8e446cc8abde93db37af74ef869bf66eeaf00a26c339bdf5e18f4074e04c388e65ce420a523a20c45620e487a9210020c958c4cedf5fdfb0249bbeb8d47be57e0b23aa80aac710c6d1d86ef52f7e550c4c9f1a8ce844f5b7b6435e754caebdc8dc44684d88942cb92423f8a6277001af6091e8eb1684c75e29f1f33349b27bb3a65ded1fc364feb474afd8dcc74f4e4742623eb19e0e48f8ed81974179292dc7a629f4ad128365070a02c571f95dfcb3d914cd6aa5e77700f0a8cdc22865892d51c81192fa6024e810b8ca5dde7c09683eb971b30e465cbbd1931cbea251d67089b18077bffee223a04ea892e6eed83e3179d8227895d0a33573472536f596bafd57273971955b9a3ec21fcfe037d7b8c5fbc72f090bed18c5b4b3677f8cf085bd831db599b777962ba1f7d27cf15bbf2f5d21dc8207fd9fd5e87a7b5b4515d604947ff89938c3dc45e9e88730824526563811bbf209668a03573f9924a37e4988d81deb5f279af470f5870f85bf4a3b84806731b2009128d5b21a2c391b10bb084493bd9644dd839db2dfa83cf18f55fab4962697e14ce36b2be538bd2734028769da4240ef50b965e749d33603dbc8f4033d115184d4756af34d0dfa51674f449eb8f3ac62eca5f167b145a22334a36b53ed71599ab43f664c088975f4fe4d83dacec93267b0f2e0579ad53dcb62aab93f07fa2ba7da383eb5794fa209f1359485c812313e361eb3cc770f3d78c84c634ca223af7f8408a470a2d0d3ee1f97801b9567de0a7faf05faf5b67f640c7997c23ef4e87086cfc965e00e9d6753aca55308f194f3d091676f53750572ddbe9412c4ff2dc944b07c6fab1c4d2c8dd36ac2f0cd9a85e49e398836c6352b12694992fee1150d2d7c73b16a775bbe3da009c68ac97bd2d4e759ca39c35d494bda13dd03630d6605022f5c7ba424227f9a79a54540eda8b81ebbda2114a7022370a191f6c28746a706fcc46c9681e3cca81d5c40b5b58e3e08a96399647e0c00c7d13d79cf8863c116a7e49b0b082de6daf15873a0d6485f28df3f18cfd8b44c40afc28c5cd78b50ae748799140e6b9318d4bddc2a8d80bed43b042762ad9ebdca4a61f06e09a84f36c7818e9f64b6962a1484dfac83d467a4c16ece715ced465e40f1ce93be2ac6413222a9981845d4863b2849fee3caa4270e6208c6fd65a595268d85718765971604be848a7a9c3dcb05cb4c3694895373728c2f8b4414d553cf31e209d987aeaa52fcefb64325b0dfec674888a89ca3592e7b93e768a77d6d0d2ba30cc16962badfd4359518731f407e83c5acabc1424aec07d3bc366948d5c29b51375a5432cb65fb6355c8255bbc58cf8d45ea123b180c83d3e245cc2f4128749e02c646b713cab39fd27f9eb7091c64eb000465f75ec9779cd7fc8773d19f977f0b92233bca54c477c5f70cc6d3ba8a04cd4c2834b685ce5acf17da34871c01cf3daf620629c7780221c414de0268f3559cd0f65e309e88c730c2995a017df1f639473803cde0c9f844764b2ada291fcaf0fb6f1db698dcf7e7638af08db533226596ce02d2ec87b1aad0fe9b3a2aeeafb6bfcd844ad27bbdb1f342e89107b7fefbb62881f7e4156d037963bc556f5499b0044926a4a548b36f1a4faf58921b5c30f93f6c6cbf0e8a314ecc5412c0161d37f0a1fada1a23494b07e621b3634382e365e081beba971410d8b43cb3a8c368fbcd3ef27c43acb19870da8e955f47b0a243179eaed976fb2fa0837c2907a33e09d5ab3e00ddf486fd1bbb78cad61fd7f876096816ab452bb0fa7c11ed76d4d86ca45a31f79485d92ed82a8d7875a14c9c13e33f218ae254ecb2d48241e36cc774cbed7aaf9d60dc702dc4ecbf4fe2c2ee00920cf6153983df5ea9645b59e1a2cc719660d30d0999d0f8b29bda9cb56c927c5c1d923e31e10652f693d53b916dafe655923dd703ea6f499ec8e5ac1b5ca95efef44bcc611b1278996cfd15e75472c02dcd4366b296b9f0cfb1fd572df857eada8a68d75ee0cba4eec5da70dc0a400b9d567adeb7d57796f4517aa04587a4ad87b80f889eadc3e735b1378ebf7a276cb953f44aea126835be17fbe58acd32736be94569335304ce31aa7b0c97c0594ef660bd2a6d6e63d71df07944bab00f6348560de513899f603b0bf75eabbc73c9c854541e8ef1521a4351e488d81c22b0d715a7e2f7db914423d6e637f2f736be4efb4bb55ed4aaa8d225aac6716f9dbb72f135632d335c1ed4ddf9143af2d743f7f0d66db2018056c27b03e2d8ed44ffad60c59774cf80edcf964654a182b8caa11293509900f8e0977dbfe70acf1d01ec7f59b5e935ae7427a121e8f1a82d9fad2f92d49391ddbbd29adaff0c109bbac3ebbe1d5ef70d051ba9eb0d222ef3b708812335df364456a57c8b1d9331a10e0e7042f29062a666322e8c694ffc376221d29a8b4650a106cfd6c8ef7dab304ffeb14809a7fd9bcbe21387508f4ad17baa108e8e2c926d447d8a3c9658d8c988ab532fbba4aebd302b30b08f61f2a0b16e2270312e6e918591ee7f3ae19f22644b771eeb32afda1646f6faa7e1c3d961a3436944a4905c7bd2b9262de8a54a4e4cfdc4b2b07e852e150b2d5e047b4548f983df39ea1a5f1787afb418fc2368d0ac0e9c1b99630c0c68bff1d8cb35919f2194f54b709397bb7b380bf7913d969bf9d29d75b575c3dd62d9511cbe8f9afa8c9c0cca9269536360d6e114abefb8bf9c9344cc5862e077202df4cca1d892322b96f8b7b73fffcf90f6469079b49b4fd49acf6516d5993aea8ab81c8b4327f6903c5746dcffac453f17da97b5e94b36667d9f0b9658c93a63cceca033e06b5e1d42180aa061ee6b8def6aa558d725ac0602e7dd7ef8475c1a47fb189098d466ef1631e7912c35a191a5d0f617069038797dbb0eeef245c746c96d2eb5090bdbb83fc1f90d9ae5983e42ec85751447455af8bcaca7a95e8e164db5cdfe31e430bf0a1832112445931e9e4fe80e03ee8d9ef768f2b3898a8a237f0e5fd57fed2134f02d1b1cfb8d5f5e5d38c9e4fdf678b4c987fd2701e7cb92516ffeeec7fbd5973597ec5a502ea5f31dafd28c4c4b0dfbb1ff39fdfe78383159fb2c077323a0b06300f6dde8c9b2f22410cdb9e6c84f92f13e7d87481dcf55e74ae813327f4c5267fb58661fb620b89a61c2eb98551475f9f2408c8b73c3e650f0dc3fd388f865f94232ad64049bd54ecbf8c0dfab3f49cb6f76f1bd670a0568fc8cd44c9e3e3d3938b713b34efcc8a5659e4a3196d2e72208c24a379277d01e0f20f25e68b20b13f8f16f8009059e0fa8eac9e5490a8cf04969e69966c7abb5a36bc0569fe155d986e94f04fdcc0852d41e96c7ca9f93eec5bcd0ce5470d3df2da1dabec55cb01f289751451f2c7892a9effef7d438a843eb5fcaf701c45659052a9dce5fa9cc1e1e2c8d737dca74c87f58a4391638c35bf8485adf8e43a1207ba44dc1853481daebe9545d15ffe7e572e74f7053dfbf4c8eaa69e9e53262e3fcdc034b85f9e4884caf012ef398f761deec25a9de792eefedb0de29ed190a19b710427692d1a072b484a9dfeed4aad765acbbf893158baac5aa958deb24c9da0b6dd15311d6d6328316a6f18d07f04c0976417f9c62c90c9e5f8cbcfe397780b1f0e17238271f4e78e5b1f68cc18faaa5b51a4d84df3faa1f8f4a38ca6cd28aafeccb3533664ca4faf9dbc4f4e4b7166afc32f60295e44db6f5d196611814036b74a76b2ea9b5c5d656e9166fe616b4d534b86ae73eca6b2e1789971c55e5d5b15ee8fad38c786a4ce8eaa08f301732de7a3ee503ba9288cab5d5ebf194183a867d9a8869d542eb9e096ca072acd1e10879b82c5f243beacdaf72ded7397ee64548673ca198dfdc679b95e739438fabbde1c9f9b43ac36c8563b0f8ea85ea6750cdb4118f65beb6dc3800fccfe026a9ec436c8d849e93afbcb2731208203e95f37d1fdf9943889ca193935f40ed58da97b554a992a4c804a01a5ec4b0d2ff3b342ca8b0cbeecac464f46f42ddb6d3e943ad893686ae21018ef56125ca63228076e5989335eac871dcbcf35ec4afab9e8360bc76748d31ac1bfca732df0a5da3a33f48d1244fcf2cf4dab9108339bd89a1b5b64e4e15cbce88109e7b8e3ff415d5c783112cf242b35c8d9782acba559eb08b4431f5608cb1d4337251782af5caae9ed0dec66994296209cac3b7f9e6fc592d355527fdc408a86ec7b111467bff92e3387d791f3364722ef4820b4fcc18c634403b7549ecbb3c228297bb8f9c84c65bb029938048d19902d72eb36f4e69c004f6ca5a52c1a70f37179f307100924e3a14e1c206697f89010f8911e015a18d42ed73bf489007370b8d8881a3c155a69af0da93773d04b3b139525db844de1759d67739eadeb875332e5c6be7d08af986242c182720d59638c5500a654a882d22de3ba8c1958e2c624aee839e79b70c64c3de4d4acfc4c2c2ee244acf466729e4aed533fd4c5d7c8187a75a0aba6f7a8327ee655d5444a43a171b3d1dda99dae00517f05c9c5242a6b661ff7f45058b8bc08798420587aba00877362f3150c6e194d364baa74b1f33902bdbdc0d5261009863feddb39a5f818537a737fb51344b4e2fac337a517c0bc600d7f1258d77bf3f13c7edb", 0x1000, 0x2}, {&(0x7f0000001680)="2c26b0f0530b3d4360903876efed8c2cba9d4d75a9d60af9d3e5fa06bd78a4c1262191c06566415fdf1371efbefe6c280d66af9e48f8f0c8f24f792cce2b6cc115f8f377094b50556e3b26864aa23d8382f959bcb7b55dce8a1aae0863ffe3c9281ccce5613a8caabc6dd88095add80390b3e054d02678f215e3721b", 0x7c, 0x1}], 0x1114008, 0x0) pipe2$9p(&(0x7f0000000040), 0x81400) [ 895.028392] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 895.054261] ffff888041b49000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:48:10 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) [ 895.088038] ffff888041b49010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 895.112730] ffff888041b49020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 895.142747] ffff888041b49030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 895.167153] XFS (loop5): SB validate failed with error -117. [ 895.191643] XFS (loop0): Mounting V4 Filesystem [ 895.223399] XFS (loop0): totally zeroed log 01:48:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000000)={0x68, 0x30}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prctl$PR_SET_TSC(0x1a, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x2f, 0x4, 0x0, 0x1f, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, [], 0x1, 0x0}]}, 0x28) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFS', 0x3}], 0x8000, 0x0) [ 895.256165] XFS (loop0): failed to read root inode 01:48:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x3b, 0x0, 0x8000, 0x0) 01:48:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) ioprio_set$uid(0x0, r2, 0x8000) 01:48:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000100)={0x7, 0xfe000000, 0x98c7, 0x3, 0x0, "ab2bd38f94019f2e33ed8840734d217efaeb89", 0x535, 0x3f}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0x10000010}) [ 895.441865] XFS (loop5): SB sanity check failed [ 895.446915] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 895.476069] XFS (loop5): Unmount and run xfs_repair [ 895.489459] XFS (loop5): First 64 bytes of corrupted metadata buffer: 01:48:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB\x00', 0x5}], 0x8000, 0x0) [ 895.518706] ffff888063d27000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 895.538813] ffff888063d27010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 895.561792] ffff888063d27020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 895.587293] ffff888063d27030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 895.632908] XFS (loop5): SB validate failed with error -117. [ 895.655656] XFS (loop0): Mounting V4 Filesystem [ 895.664235] XFS (loop0): totally zeroed log [ 895.673492] XFS (loop0): failed to read root inode 01:48:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000000)={0x0, 0x9b, 0x3004, 0x1}) 01:48:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) accept(r0, 0x0, &(0x7f0000000040)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000000)={0xd, 0x8}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x3c, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x144, 0x0, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xdff}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x401}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffeffff}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7fffffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x8010}, 0x20004854) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:11 executing program 5: eventfd(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000468ca7e28c00000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00", 0x7c}], 0x0, 0x0) 01:48:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFS', 0x3}], 0x8000, 0x0) [ 896.035637] XFS (loop0): Mounting V4 Filesystem [ 896.048925] XFS (loop0): totally zeroed log [ 896.087617] XFS (loop0): failed to read root inode [ 896.093404] XFS (loop5): SB sanity check failed [ 896.099478] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 896.127922] XFS (loop5): Unmount and run xfs_repair 01:48:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000000)={0x2, [0x0, 0x0]}) [ 896.170836] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 896.238193] ffff8880519e0000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 896.268937] ffff8880519e0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:48:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000008c0)=""/4096) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/138) 01:48:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFS', 0x3}], 0x8000, 0x0) [ 896.301091] ffff8880519e0020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 896.321327] ffff8880519e0030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 896.343666] XFS (loop5): SB validate failed with error -117. 01:48:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) kexec_load(0x4, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="613a5881890047ef9fb83d5631ae956ebcd0d42d9e27b114ebc479ba57838eaff12a6c16ab78e57d4f53d61cf5485e8f81615d71df942b2082181be6c32c504098588e4b9c33d078d48611ac", 0x4c, 0x9, 0x7}], 0x30000) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000001d04000000a563cfe7"], &(0x7f0000000080)=0x2c) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x78) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0xdf) [ 896.542412] XFS (loop0): Mounting V4 Filesystem [ 896.559191] XFS (loop0): totally zeroed log [ 896.564165] XFS (loop5): SB sanity check failed [ 896.568872] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 896.590127] XFS (loop0): failed to read root inode [ 896.606222] XFS (loop5): Unmount and run xfs_repair [ 896.621266] XFS (loop5): First 64 bytes of corrupted metadata buffer: 01:48:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFS', 0x3}], 0x8000, 0x0) [ 896.663536] ffff88805620c000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 896.704111] ffff88805620c010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 896.740637] ffff88805620c020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f00000001c0)=0x28) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYRESHEX=r5], &(0x7f0000000240)=0x2c) socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f0000000200)=0xfffffffffffffe31) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0xfffffffffffffffe, 0x48) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000000)=r7, 0x4) prctl$PR_GET_SECUREBITS(0x1b) [ 896.774755] ffff88805620c030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:48:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file1\x00', 0xf7fffffffffffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000), 0x0, 0xd6}], 0x480, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = getpid() r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) r5 = dup3(r3, r4, 0x80000) ioctl$SOUND_MIXER_READ_RECMASK(r5, 0x80044dfd, &(0x7f0000000140)) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) tgkill(0xffffffffffffffff, r1, 0x2b) r6 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x0) [ 896.826972] XFS (loop5): SB validate failed with error -117. 01:48:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 01:48:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x188001, 0x0) [ 897.013059] XFS (loop5): SB sanity check failed [ 897.024941] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 897.103912] XFS (loop5): Unmount and run xfs_repair [ 897.126299] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 897.154850] XFS (loop3): device supports 512 byte sectors (not 0) [ 897.160636] XFS (loop0): Invalid superblock magic number [ 897.161345] ffff88809577d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:48:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) [ 897.213209] ffff88809577d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 897.244467] ffff88809577d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 897.269699] ffff88809577d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 897.278686] XFS (loop5): SB validate failed with error -117. 01:48:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 897.377626] XFS (loop0): Invalid superblock magic number 01:48:13 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000000c0)=0x2) 01:48:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)='xfs\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='keyring\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r1, r3, 0x0) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r4, r6, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r4, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 897.612306] XFS (loop3): device supports 512 byte sectors (not 0) 01:48:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000, 0x0, 0x0, 0x108810, 0x0) 01:48:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 897.730510] XFS (loop0): Mounting V4 Filesystem [ 897.756378] XFS (loop0): totally zeroed log [ 897.773449] XFS (loop0): failed to read root inode [ 897.820120] XFS (loop5): SB sanity check failed [ 897.826871] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x76b27866b9a3f491) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f00000000c0)={0x1, 'ip6erspan0\x00', {}, 0x5}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f00000000c0)={0x6, 0x10, [0xffff, 0x7, 0x3, 0x0]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 897.896948] XFS (loop5): Unmount and run xfs_repair [ 897.918310] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 897.925365] XFS (loop3): device supports 512 byte sectors (not 0) [ 897.968100] ffff88805760c000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 898.037841] ffff88805760c010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 898.072655] XFS (loop0): Mounting V4 Filesystem [ 898.073662] ffff88805760c020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 898.096638] ffff88805760c030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 898.098820] XFS (loop0): totally zeroed log [ 898.106820] XFS (loop5): SB validate failed with error -117. [ 898.157445] XFS (loop0): failed to read root inode 01:48:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDCTL_DSP_STEREO(r1, 0xc0045003, &(0x7f0000000000)=0x1) 01:48:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="58465342000010000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000040040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x77}, {0x0, 0x0, 0xdc6fc6e3}], 0x800441, 0x0) 01:48:14 executing program 3: syz_init_net_socket$llc(0x1a, 0x1, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a, 0x3}], 0x200080, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x10880, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r3, &(0x7f0000000140)="4442e2f2368683b7d3f46dcccb025c81625f18a477f4dd9cd3", &(0x7f00000001c0)=""/228}, 0x20) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:48:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000000c0)={0x3, 0x7fff, 0x1, 'queue0\x00', 0x4}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0x5) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 898.544989] XFS (loop3): Mounting V4 Filesystem [ 898.554287] XFS (loop3): totally zeroed log [ 898.558994] XFS (loop3): failed to read root inode 01:48:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') [ 898.648830] XFS (loop5): Invalid superblock magic number 01:48:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x25511f92, 0x220200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010006000000000000001b00000008009a000200d2"], 0x1c}}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$vsock_stream(r4, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @host}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="3000000010000108fcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000016e8bc4d12385935", @ANYRES32=r7, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x8}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_STA_FLAGS={0x8, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_ASSOCIATED={0x4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000) exit_group(0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20020840}, 0x20000801) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f0000000040)="f49d33608c643af443f52afb29a07808feea", 0x12, 0x8}], 0x0, 0x0) 01:48:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x48, r3, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffff9}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x44080}, 0x24000004) 01:48:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x25511f92, 0x220200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010006000000000000001b00000008009a000200d2"], 0x1c}}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$vsock_stream(r4, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @host}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="3000000010000108fcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000016e8bc4d12385935", @ANYRES32=r7, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x8}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_STA_FLAGS={0x8, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_ASSOCIATED={0x4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000) exit_group(0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20020840}, 0x20000801) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f0000000040)="f49d33608c643af443f52afb29a07808feea", 0x12, 0x8}], 0x0, 0x0) 01:48:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f00000001c0)=0x3, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000c872b57d06dfaa89d0568bb02c27f42a0000d3e445de11104eb97d49e67f71768f48971a00d941fe99c917ffa0d8e058a391d1fab9fca7a1c0771ba3a9f28479433e082bff964fc593410e3f5fcb0469e2854dd734b023"], &(0x7f0000000080)=0x2c) r4 = accept4$rose(r3, 0x0, &(0x7f0000000000), 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000040)={0x3, 'sit0\x00', {0x3}, 0x3ff}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 898.836699] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 898.932769] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 01:48:14 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000340)=@v3, 0x18, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') chown(&(0x7f0000000180)='./bus/file0\x00', 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 899.026784] XFS (loop3): SB sanity check failed [ 899.032207] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 899.044869] XFS (loop3): Unmount and run xfs_repair [ 899.051195] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 899.058234] ffff888218de3000: 58 46 53 42 00 00 10 00 f4 9d 33 60 8c 64 3a f4 XFSB......3`.d:. [ 899.074503] ffff888218de3010: 43 f5 2a fb 29 a0 78 08 fe ea 00 00 00 00 00 00 C.*.).x......... [ 899.085232] XFS (loop5): SB sanity check failed [ 899.091333] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 899.113564] ffff888218de3020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x55, "a963cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x5, 0x1, 0x0, 0x0, 0x0, {0xf, 0x0, 0x3}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0xa4) socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000200)=0x28) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0], 0x2}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, 0x0, r6, 0x0) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r7, r9, 0x0) keyctl$reject(0x13, 0x0, 0x100000, 0x9a9, r7) [ 899.137983] XFS (loop5): Unmount and run xfs_repair [ 899.150757] ffff888218de3030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 899.161366] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 899.168441] XFS (loop3): SB validate failed with error -117. [ 899.168980] ffff888218bf5000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 899.196747] ffff888218bf5010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 899.206683] ffff888218bf5020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 899.215058] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 899.226928] ffff888218bf5030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 899.238590] XFS (loop5): SB validate failed with error -117. 01:48:15 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80880, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000000c0)=0x9, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 899.326139] FAULT_INJECTION: forcing a failure. [ 899.326139] name failslab, interval 1, probability 0, space 0, times 0 [ 899.356393] CPU: 1 PID: 12576 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 899.364318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.373681] Call Trace: [ 899.376283] dump_stack+0x1b2/0x283 [ 899.379929] should_fail.cold+0x10a/0x154 [ 899.384088] should_failslab+0xd6/0x130 [ 899.388071] __kmalloc+0x2c1/0x400 [ 899.391626] ? SyS_memfd_create+0xb9/0x3a0 [ 899.395901] SyS_memfd_create+0xb9/0x3a0 [ 899.399972] ? shmem_fcntl+0x120/0x120 [ 899.403865] ? SyS_clock_settime+0x1a0/0x1a0 [ 899.408279] ? do_syscall_64+0x4c/0x640 [ 899.412256] ? shmem_fcntl+0x120/0x120 [ 899.416157] do_syscall_64+0x1d5/0x640 [ 899.420147] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.425339] RIP: 0033:0x45ca59 [ 899.428530] RSP: 002b:00007fb375db3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 899.436247] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 899.443519] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 899.450794] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 899.458158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 899.465434] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007fb375db46d4 01:48:15 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f00000000c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a028f3433a50eaaf0d080c14aa021523de468550e1db7cf6c5365091c", 0x7c, 0x80000000}, {0x0, 0x1c, 0x5c2fc6e2}], 0x800, 0x0) [ 899.589225] XFS (loop5): SB sanity check failed [ 899.592888] FAULT_INJECTION: forcing a failure. [ 899.592888] name failslab, interval 1, probability 0, space 0, times 0 [ 899.605258] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 899.605265] XFS (loop5): Unmount and run xfs_repair [ 899.605271] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 899.605279] ffff88821931d000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 899.605286] ffff88821931d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 899.605292] ffff88821931d020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 899.605298] ffff88821931d030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 899.667799] XFS (loop5): SB validate failed with error -117. 01:48:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000000)=0xffffe207) 01:48:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000100000d3a86a00000000000000000000000034fb8fb9e4bf48b6ad26c53f004f5c0500000000000000040000000000000d880000000040000d890000000000000d8a000000010000000000000000000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7a, 0x81}, {0x0}], 0x0, 0x0) 01:48:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0xa30000, 0x6, 0x7, r3, 0x0, &(0x7f0000000040)={0x990a73, 0x5e7, [], @p_u8=&(0x7f0000000000)=0x20}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) bind$packet(r4, &(0x7f0000000140)={0x11, 0x5, r7, 0x1, 0x1f, 0x6, @random="071cbb599e6c"}, 0x14) 01:48:15 executing program 0: clone(0x200028d6ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)) r1 = dup(r0) r2 = accept$ax25(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @default}, [@rose, @remote, @remote, @null, @null, @bcast, @rose, @bcast]}, &(0x7f0000000240)=0x48) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000280)={0x3, 'bridge_slave_1\x00', {0x9}, 0x923}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_SET_OP_VERSION(r3, 0x1, 0x53, &(0x7f0000000300), &(0x7f0000000340)=0x8) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x28) write$9p(r1, &(0x7f00000000c0)="58e7c6d8f9d73c44da5ec0096df29bbdff61ad32fa4bffe45dae380733a307e2cb9a47553dc5b5fdd6bfcd1adb8d07763e74d22143aae8be043e279896ba0d3d6c4d6b1af9be562336297b625bfda4a9a8c8879f", 0x54) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) accept4(r5, 0x0, &(0x7f00000002c0), 0x180000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 899.858166] CPU: 0 PID: 12606 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 899.866216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.875715] Call Trace: [ 899.878331] dump_stack+0x1b2/0x283 [ 899.881980] should_fail.cold+0x10a/0x154 [ 899.886155] should_failslab+0xd6/0x130 [ 899.890145] kmem_cache_alloc+0x28e/0x3c0 [ 899.894309] __d_alloc+0x2a/0x9b0 [ 899.897771] ? lock_downgrade+0x6e0/0x6e0 [ 899.901934] __shmem_file_setup.part.0+0xcb/0x3c0 [ 899.906791] ? shmem_rename2+0x6e0/0x6e0 [ 899.910861] ? __alloc_fd+0x1bf/0x490 [ 899.914681] SyS_memfd_create+0x1f6/0x3a0 [ 899.918840] ? shmem_fcntl+0x120/0x120 [ 899.922736] ? SyS_clock_settime+0x1a0/0x1a0 [ 899.927155] ? do_syscall_64+0x4c/0x640 [ 899.931134] ? shmem_fcntl+0x120/0x120 [ 899.935037] do_syscall_64+0x1d5/0x640 [ 899.938942] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.944133] RIP: 0033:0x45ca59 [ 899.947330] RSP: 002b:00007fb375db3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 01:48:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0xc002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = dup(r2) write$P9_RMKNOD(r3, &(0x7f0000000040)={0x14, 0x13, 0x100, {0x40, 0x3, 0x5}}, 0x14) [ 899.955044] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 899.962323] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 899.969604] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 899.976881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 899.984160] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007fb375db46d4 01:48:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x20, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a0000000100001000000004017f00000000000000b424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0xc0000, 0x0) 01:48:15 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) [ 900.084706] XFS (loop5): SB sanity check failed [ 900.094147] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 900.122213] XFS (loop5): Unmount and run xfs_repair [ 900.135677] FAULT_INJECTION: forcing a failure. [ 900.135677] name failslab, interval 1, probability 0, space 0, times 0 [ 900.150361] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 900.180349] ffff88821850f000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 900.194568] CPU: 0 PID: 12667 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 900.202566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.211925] Call Trace: [ 900.214518] dump_stack+0x1b2/0x283 [ 900.218161] should_fail.cold+0x10a/0x154 [ 900.220266] ffff88821850f010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 900.222323] should_failslab+0xd6/0x130 [ 900.222335] kmem_cache_alloc+0x28e/0x3c0 [ 900.222348] ? shmem_destroy_callback+0xa0/0xa0 [ 900.243928] shmem_alloc_inode+0x18/0x40 [ 900.248002] ? shmem_destroy_callback+0xa0/0xa0 [ 900.252677] alloc_inode+0x5d/0x170 [ 900.256314] new_inode_pseudo+0x14/0xe0 [ 900.260301] new_inode+0x1b/0x40 [ 900.263791] shmem_get_inode+0x74/0x780 [ 900.264311] ffff88821850f020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 900.267770] __shmem_file_setup.part.0+0x104/0x3c0 [ 900.267782] ? shmem_rename2+0x6e0/0x6e0 [ 900.267792] ? __alloc_fd+0x1bf/0x490 [ 900.289377] SyS_memfd_create+0x1f6/0x3a0 [ 900.293581] ? shmem_fcntl+0x120/0x120 [ 900.297473] ? SyS_clock_settime+0x1a0/0x1a0 [ 900.301926] ? do_syscall_64+0x4c/0x640 [ 900.304991] ffff88821850f030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 900.305902] ? shmem_fcntl+0x120/0x120 [ 900.318605] do_syscall_64+0x1d5/0x640 [ 900.322510] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.327702] RIP: 0033:0x45ca59 [ 900.330891] RSP: 002b:00007fb375db3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 900.337723] XFS (loop5): SB validate failed with error -117. [ 900.338598] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 900.338606] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 900.338612] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 900.338617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 900.338626] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007fb375db46d4 01:48:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x3, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x200, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_getroute={0x1c, 0x1a, 0x200, 0x70bd26, 0x25dfdbfc, {0x2, 0x10, 0x0, 0x8, 0x0, 0x0, 0x1, 0x7, 0x300}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8024}, 0x8) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000000200)={{0x0, 0x0, 0x80}}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) sched_getscheduler(r0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f00000001c0)="58465342000010f4233f0000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400000000000008000000f21b2d000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec000061b1e644", 0x82}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f00000001c0)="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", 0x117, 0x4}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 900.702175] XFS (loop5): SB sanity check failed [ 900.707105] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 900.750225] XFS (loop5): Unmount and run xfs_repair [ 900.765672] XFS (loop5): First 64 bytes of corrupted metadata buffer: 01:48:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xff7ffffffffffffd, 0xaaaaaaaaaaaad57, &(0x7f0000000000)=[{&(0x7f00000001c0)="584653420000100000000000000010000004000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a027f562add384835b0dc5c22d07b92d85994ebba", 0x8f}, {0x0, 0x0, 0x5c6fc6e2}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x4, 0x8f, 0x4d, 0x0, 0x8, 0x6}) 01:48:16 executing program 4: syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfff, 0x402d82) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000001c0)={0x2, "b25f40cf36473b5639a4e38e87594455284cfd81d301c2a065ee93604e1729b6", 0x1}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x301200, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="f45811ba75ff7a0509f18156a79f10c2868e50984a077df51b5dab2a498b717b80208a831e0403d0aac2be515fe710a6f58e40ebc17ce28691c8a22dcbfd2e02218b69c21f7493cb9bf33b87ca95ac5980a3286e21b4c5dde50c5b463c368ecc56815590c6dc69f4134163d91fc49305536556f297b03f8db5120bdaedcd7b4b0a862382cd5bbcb13619ff059b49cb30d8016a78beb24239ad6b574d63d41c0e76db4d295f29e3278a8769bc4853398c396c5940b620bddd1f1030d6b8f5a6fc7257a00b02f39f7e892ce50fe6479809296db6ea3b47e8f8485543cb0c465db0ce6f07b3eeaa14166b97fd3313c2f486dd01f3a8b08cba355a7607a90e36b86b9aeebe5f86e9dda05b190903fec110b6fc6bab214d74615a78e6b971286765b74a25b252ca31769ba7c7ea854b11f7bb235f8b3418c0b187bd855d890601e42bf36b2f4fcb888a0ea52fd2702933a6097d8269b0303ffe61370e422a7435aced5b7f343891b3f39ca75ce0da59a306ebf0d5b1110044002f6465762f646d6d6964692300000000c304d740adb0c085bddfdcc7411965f6b5378d6dc8d9195ff2eb0000"], 0x350}}, 0x4) getegid() [ 900.816221] ffff888218942000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 900.863848] ffff888218942010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 900.910381] ffff888218942020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:16 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) [ 900.988992] ffff888218942030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 901.011787] FAULT_INJECTION: forcing a failure. [ 901.011787] name failslab, interval 1, probability 0, space 0, times 0 [ 901.042887] XFS (loop5): SB validate failed with error -117. [ 901.073467] CPU: 0 PID: 12745 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 901.081383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.090747] Call Trace: [ 901.093344] dump_stack+0x1b2/0x283 [ 901.096985] should_fail.cold+0x10a/0x154 [ 901.101140] should_failslab+0xd6/0x130 [ 901.105129] kmem_cache_alloc+0x28e/0x3c0 [ 901.109288] selinux_inode_alloc_security+0xb1/0x2a0 [ 901.114392] security_inode_alloc+0x8f/0xd0 [ 901.118722] inode_init_always+0x576/0xb10 [ 901.122971] alloc_inode+0x7a/0x170 [ 901.126603] new_inode_pseudo+0x14/0xe0 [ 901.130586] new_inode+0x1b/0x40 [ 901.135261] shmem_get_inode+0x74/0x780 [ 901.139247] __shmem_file_setup.part.0+0x104/0x3c0 [ 901.144176] ? shmem_rename2+0x6e0/0x6e0 [ 901.148233] ? __alloc_fd+0x1bf/0x490 [ 901.152041] SyS_memfd_create+0x1f6/0x3a0 [ 901.156197] ? shmem_fcntl+0x120/0x120 [ 901.160082] ? SyS_clock_settime+0x1a0/0x1a0 [ 901.164478] ? do_syscall_64+0x4c/0x640 [ 901.168437] ? shmem_fcntl+0x120/0x120 [ 901.172309] do_syscall_64+0x1d5/0x640 [ 901.176184] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.181354] RIP: 0033:0x45ca59 [ 901.184527] RSP: 002b:00007fb375db3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 901.192218] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 901.199467] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 901.206718] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 901.213967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 901.221219] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007fb375db46d4 01:48:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup=r1, r3, 0x1f}, 0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7f, 0x0, 0x0, 0x8000, 0x0) 01:48:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x7, 0x0, &(0x7f0000000080)={r0, r1+60000000}, &(0x7f00000000c0)) 01:48:17 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x64, r2, 0x2, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4034b1d5d0fb81b2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x20}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f00000001c0)={@fixed, 0x5}) [ 901.807193] FAULT_INJECTION: forcing a failure. [ 901.807193] name failslab, interval 1, probability 0, space 0, times 0 [ 901.862519] CPU: 0 PID: 12791 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 901.870570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.879930] Call Trace: [ 901.882537] dump_stack+0x1b2/0x283 [ 901.886185] should_fail.cold+0x10a/0x154 [ 901.890354] should_failslab+0xd6/0x130 [ 901.894340] kmem_cache_alloc+0x28e/0x3c0 [ 901.898503] get_empty_filp+0x86/0x3e0 [ 901.902396] alloc_file+0x23/0x440 [ 901.905951] __shmem_file_setup.part.0+0x198/0x3c0 [ 901.910895] ? shmem_rename2+0x6e0/0x6e0 [ 901.914953] ? __alloc_fd+0x1bf/0x490 [ 901.918765] SyS_memfd_create+0x1f6/0x3a0 [ 901.922916] ? shmem_fcntl+0x120/0x120 [ 901.926805] ? SyS_clock_settime+0x1a0/0x1a0 [ 901.931228] ? do_syscall_64+0x4c/0x640 [ 901.935203] ? shmem_fcntl+0x120/0x120 [ 901.939095] do_syscall_64+0x1d5/0x640 [ 901.943006] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.948193] RIP: 0033:0x45ca59 [ 901.951384] RSP: 002b:00007fb375db3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 901.959101] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 901.966387] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 901.973660] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 901.980941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 901.988343] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007fb375db46d4 01:48:17 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000100)=[0xffff, 0x6, 0xffffffff, 0x6, 0x7], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x7, 0xbbbbbbbb}) exit_group(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x303841, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:17 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c7465810000003552000000005cc070e6b4c6d2804200000000f800a563cfe70000000000008c3479134c1094ea0c049060ac7b302956da2a151e027d57f790cbc0e4e55fe8b1acec27381a895d67062b25fc534bbe4f1a2a63ebadd8aef2670c9cfb7b5561ad96baac371d2c1383210183d4ed058e1aa9bf28e5046a5933af930903519c465902ecf88a4eb8b535aa58f8afda1c087c2d96bb3a892fdbbeb01e18f5afbd9d29d06f243f361e4114296e7e150b1380514bc1b06cc895e8df235c6ca18de09060433f9fc5cfd106840d29aecf6ca81852e7aebcf95289de01ff43fe57b8c1bbcfbc10b52a398339335dc586d605f542bb23fa2fcf090b018704ed02ca800f998a917900893e65ac46651baa75503f96972481731418424906609a2b9dc0cbacdf291e2131d1d3b8bb789df0d830d08a56e47d9a10a3f0f08116697e965850c22be0b0a0caba1b296f198cd2b348dbf4f5459803e325e0b2e4414d4658e53cec2ad14406ec2fa86e17ecec9c1b2b17dbe7ad2f571fb41df0b3389ae71806381c7fad8db948792f5d49da47b40df5838d073f411e4e79cfc88af6c7507545f0cadb3ca654b3d4ecc085ac25fe4c8952ca044b23060bdb2895e376ba6361e3fe4cea555dd60e90f1dfae65c9b995389bddcfe74c9df84f21143b25aea629462c976b2085"], &(0x7f0000000080)=0x2c) ioctl$KVM_SMI(r1, 0xaeb7) r2 = semget$private(0x0, 0x20000000102, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000008c0)=""/4096) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r7 = dup2(r6, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000001080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000340), r8, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r8, 0x10, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 902.102800] FAULT_INJECTION: forcing a failure. [ 902.102800] name failslab, interval 1, probability 0, space 0, times 0 [ 902.121790] CPU: 0 PID: 12805 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 902.129714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.139084] Call Trace: [ 902.141682] dump_stack+0x1b2/0x283 [ 902.145328] should_fail.cold+0x10a/0x154 [ 902.149491] should_failslab+0xd6/0x130 [ 902.153476] kmem_cache_alloc+0x28e/0x3c0 [ 902.157635] selinux_file_alloc_security+0xaf/0x190 [ 902.162661] security_file_alloc+0x66/0xa0 [ 902.166911] ? selinux_is_enabled+0x5/0x50 [ 902.171156] get_empty_filp+0x15c/0x3e0 [ 902.175133] alloc_file+0x23/0x440 [ 902.178682] __shmem_file_setup.part.0+0x198/0x3c0 [ 902.183620] ? shmem_rename2+0x6e0/0x6e0 [ 902.187680] ? __alloc_fd+0x1bf/0x490 [ 902.191499] SyS_memfd_create+0x1f6/0x3a0 [ 902.195651] ? shmem_fcntl+0x120/0x120 [ 902.199539] ? SyS_clock_settime+0x1a0/0x1a0 [ 902.203964] ? do_syscall_64+0x4c/0x640 [ 902.207944] ? shmem_fcntl+0x120/0x120 [ 902.211846] do_syscall_64+0x1d5/0x640 [ 902.215767] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.220964] RIP: 0033:0x45ca59 [ 902.224152] RSP: 002b:00007fb375db3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 902.231863] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 902.239136] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004c1bb1 01:48:18 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0xf4, 0x7fff, 0x4, 0xc866, 0x2}}) ioctl$VT_ACTIVATE(r1, 0x5606, 0x7fffffff) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a0000000100001000000000015000939ae5190a68ea9d11fdaffad1000000800000035ab42402000400000400", 0x7c, 0x4000080000000}, {0x0, 0x0, 0x200005c6fc6e3}], 0x20800, 0x0) 01:48:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3effffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0xfffffffffffffffe}], 0x0, 0x0) [ 902.246413] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 902.253688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 902.260962] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007fb375db46d4 01:48:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010006000000000000001b00000008009a000200d2"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4000810) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 902.383053] XFS (loop5): SB sanity check failed [ 902.392316] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 902.446769] XFS (loop5): Unmount and run xfs_repair 01:48:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) socket$inet(0x2, 0x80000, 0x6) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) recvmmsg(r0, &(0x7f0000006b00)=[{{&(0x7f0000000000)=@isdn, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/40, 0x28}], 0x1}, 0x1}, {{&(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)=""/163, 0xa3}], 0x2, &(0x7f00000003c0)=""/20, 0x14}, 0x1}, {{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000001740)=[{&(0x7f0000000480)=""/71, 0x47}, {&(0x7f0000000500)=""/183, 0xb7}, {&(0x7f00000005c0)=""/179, 0xb3}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/189, 0xbd}], 0x5, &(0x7f00000017c0)=""/140, 0x8c}, 0x1}, {{&(0x7f0000001880)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001900)=""/61, 0x3d}, {&(0x7f0000001940)=""/68, 0x44}, {&(0x7f00000019c0)=""/67, 0x43}], 0x3, &(0x7f0000001a80)=""/117, 0x75}, 0x7fffffff}, {{&(0x7f0000001b00)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000002e00), 0x0, &(0x7f0000002e80)=""/96, 0x60}, 0x5}, {{&(0x7f0000002f00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000005180), 0x0, &(0x7f0000001b80)=""/132, 0x84}, 0x9}, {{0x0, 0x0, &(0x7f0000005580)=[{&(0x7f00000052c0)=""/185, 0xb9}, {&(0x7f0000005380)=""/236, 0xec}, {&(0x7f0000005480)=""/151, 0x97}, {&(0x7f0000005540)=""/41, 0x29}], 0x4, &(0x7f00000055c0)=""/63, 0x3f}, 0xffff}, {{&(0x7f0000005600)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f00000069c0)=[{&(0x7f0000005680)=""/3, 0x3}, {&(0x7f00000056c0)=""/106, 0x6a}, {&(0x7f0000001c40)=""/57, 0x39}, {&(0x7f0000005780)=""/120, 0x78}, {&(0x7f0000005800)=""/4081, 0xff1}, {&(0x7f0000006800)=""/42, 0x2a}, {&(0x7f0000006840)=""/14, 0xe}, {&(0x7f0000006880)=""/31, 0x1f}, {&(0x7f00000068c0)=""/200, 0xc8}], 0x9, &(0x7f0000006a80)=""/104, 0x68}, 0x80000001}], 0x8, 0x40010001, &(0x7f0000006d00)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000006e00)={&(0x7f0000006d40)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000006dc0)={&(0x7f0000006d80)={0x28, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 01:48:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x301c080, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) 01:48:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x7) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696b74657200000000000015000000000000e89e9da82300000068b96982c7180000000000000000006f488ac92feda5976e0c0c807d7ebe350105f46f2c47d8b701bab36e0fb9caae92bfe565dbdb600be3c37d6b8efb8df84aac90d3e57fe7ea911710"], &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, 0x400, 0x3, 0x48, &(0x7f0000ffc000/0x4000)=nil, 0x7}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000100)) [ 902.471202] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 902.486979] ffff8882192b2000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 902.510321] ffff8882192b2010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 902.540443] ffff8882192b2020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 902.549888] ffff8882192b2030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 902.569149] XFS (loop5): SB validate failed with error -117. 01:48:18 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001840)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000001900)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r1, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x20000880) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:18 executing program 0 (fault-call:2 fault-nth:0): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 902.682729] FAULT_INJECTION: forcing a failure. [ 902.682729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 902.733827] CPU: 1 PID: 12882 Comm: syz-executor.3 Not tainted 4.14.184-syzkaller #0 [ 902.741749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.751119] Call Trace: [ 902.753727] dump_stack+0x1b2/0x283 [ 902.757376] should_fail.cold+0x10a/0x154 [ 902.761540] __alloc_pages_nodemask+0x22b/0x2730 [ 902.766310] ? check_preemption_disabled+0x35/0x240 [ 902.771427] ? perf_trace_lock+0x109/0x4b0 [ 902.775678] ? perf_trace_lock_acquire+0x4b0/0x4b0 [ 902.780618] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 902.785466] ? HARDIRQ_verbose+0x10/0x10 [ 902.789536] ? avc_has_perm_noaudit+0x157/0x2a0 [ 902.794216] ? lock_acquire+0x170/0x3f0 [ 902.798200] ? lock_downgrade+0x6e0/0x6e0 [ 902.802367] alloc_pages_vma+0xc1/0x4b0 [ 902.806353] shmem_alloc_page+0xe1/0x180 [ 902.810421] ? shmem_swapin+0x180/0x180 [ 902.814404] ? cred_has_capability+0x11e/0x220 [ 902.818995] ? selinux_inode_copy_up+0x180/0x180 [ 902.823752] ? find_get_entry+0x31b/0x660 [ 902.827916] ? check_preemption_disabled+0x35/0x240 [ 902.832951] ? __vm_enough_memory+0x261/0x460 [ 902.837457] shmem_alloc_and_acct_page+0x126/0x670 [ 902.842403] shmem_getpage_gfp+0x388/0x27b0 [ 902.846773] ? shmem_should_replace_page.isra.0.part.0+0x10/0x10 [ 902.852934] shmem_write_begin+0xeb/0x190 [ 902.857271] generic_perform_write+0x1c9/0x420 [ 902.861871] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 902.866549] ? current_time+0xb0/0xb0 [ 902.870380] ? lock_acquire+0x170/0x3f0 [ 902.874365] __generic_file_write_iter+0x227/0x590 [ 902.879430] generic_file_write_iter+0x36f/0x650 [ 902.884204] __vfs_write+0x44e/0x630 [ 902.887931] ? HARDIRQ_verbose+0x10/0x10 [ 902.892001] ? kernel_read+0x110/0x110 [ 902.895913] ? rcu_read_lock_sched_held+0x10a/0x130 [ 902.900945] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 902.905714] vfs_write+0x17f/0x4d0 [ 902.909267] SyS_pwrite64+0x116/0x140 [ 902.913078] ? SyS_pread64+0x140/0x140 [ 902.916967] ? fput+0xb/0x140 [ 902.920078] ? do_syscall_64+0x4c/0x640 [ 902.924060] ? SyS_pread64+0x140/0x140 [ 902.927954] do_syscall_64+0x1d5/0x640 [ 902.931853] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.937043] RIP: 0033:0x4168b7 [ 902.940242] RSP: 002b:00007fb375db3a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 902.948044] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 00000000004168b7 [ 902.955321] RDX: 0000000000000004 RSI: 0000000020010000 RDI: 0000000000000004 [ 902.962597] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 902.969876] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 902.977150] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007fb375db46d4 [ 902.997344] FAULT_INJECTION: forcing a failure. [ 902.997344] name failslab, interval 1, probability 0, space 0, times 0 [ 903.021543] CPU: 1 PID: 12896 Comm: syz-executor.0 Not tainted 4.14.184-syzkaller #0 [ 903.029546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.038909] Call Trace: [ 903.041514] dump_stack+0x1b2/0x283 [ 903.045155] should_fail.cold+0x10a/0x154 [ 903.049316] should_failslab+0xd6/0x130 [ 903.053297] __kmalloc+0x2c1/0x400 [ 903.056843] ? SyS_memfd_create+0xb9/0x3a0 [ 903.061088] SyS_memfd_create+0xb9/0x3a0 [ 903.065156] ? shmem_fcntl+0x120/0x120 [ 903.069057] ? SyS_clock_settime+0x1a0/0x1a0 [ 903.073491] ? do_syscall_64+0x4c/0x640 [ 903.077535] ? shmem_fcntl+0x120/0x120 [ 903.081435] do_syscall_64+0x1d5/0x640 [ 903.085336] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.090529] RIP: 0033:0x45ca59 [ 903.093714] RSP: 002b:00007f5a1ae01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 903.101426] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 903.108700] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 903.115979] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 903.123256] R10: 0000000003bfc6e3 R11: 0000000000000246 R12: 0000000000000003 [ 903.130535] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f5a1ae026d4 01:48:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@dev, @multicast1, @empty}, &(0x7f0000000080)=0xc) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 903.198054] XFS (loop5): SB sanity check failed [ 903.203653] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 903.245682] XFS (loop5): Unmount and run xfs_repair [ 903.265010] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 903.281376] ffff88821b748000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:48:19 executing program 0 (fault-call:2 fault-nth:1): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 903.301642] ffff88821b748010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 903.323518] ffff88821b748020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 903.353196] ffff88821b748030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 903.368175] FAULT_INJECTION: forcing a failure. [ 903.368175] name failslab, interval 1, probability 0, space 0, times 0 [ 903.386130] XFS (loop5): SB validate failed with error -117. [ 903.391246] CPU: 1 PID: 12921 Comm: syz-executor.0 Not tainted 4.14.184-syzkaller #0 [ 903.399837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.409203] Call Trace: [ 903.411812] dump_stack+0x1b2/0x283 [ 903.415455] should_fail.cold+0x10a/0x154 [ 903.419615] should_failslab+0xd6/0x130 [ 903.423600] kmem_cache_alloc+0x28e/0x3c0 [ 903.427761] __d_alloc+0x2a/0x9b0 [ 903.431216] ? lock_downgrade+0x6e0/0x6e0 [ 903.435499] __shmem_file_setup.part.0+0xcb/0x3c0 [ 903.440351] ? shmem_rename2+0x6e0/0x6e0 [ 903.444417] ? __alloc_fd+0x1bf/0x490 [ 903.448232] SyS_memfd_create+0x1f6/0x3a0 [ 903.452388] ? shmem_fcntl+0x120/0x120 [ 903.456278] ? SyS_clock_settime+0x1a0/0x1a0 [ 903.460689] ? do_syscall_64+0x4c/0x640 [ 903.464667] ? shmem_fcntl+0x120/0x120 [ 903.468562] do_syscall_64+0x1d5/0x640 [ 903.472459] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.477652] RIP: 0033:0x45ca59 [ 903.480838] RSP: 002b:00007f5a1ae01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 903.488551] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 903.495827] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 903.503100] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 903.510375] R10: 0000000003bfc6e3 R11: 0000000000000246 R12: 0000000000000003 [ 903.517648] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f5a1ae026d4 01:48:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x800, 0x115100) 01:48:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x282001, 0x0) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e23, @private=0xa010100}, {0x6, @local}, 0x7e, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000240)=0x4, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r5, 0xc01864b1, &(0x7f0000000100)={0xff, 0x1, 0x3, 0x0, &(0x7f0000000080)}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:19 executing program 0 (fault-call:2 fault-nth:2): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 903.697862] FAULT_INJECTION: forcing a failure. [ 903.697862] name failslab, interval 1, probability 0, space 0, times 0 [ 903.717595] CPU: 0 PID: 12956 Comm: syz-executor.0 Not tainted 4.14.184-syzkaller #0 [ 903.725512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.734924] Call Trace: [ 903.737536] dump_stack+0x1b2/0x283 [ 903.741181] should_fail.cold+0x10a/0x154 [ 903.745337] should_failslab+0xd6/0x130 [ 903.749317] kmem_cache_alloc+0x28e/0x3c0 [ 903.753473] ? shmem_destroy_callback+0xa0/0xa0 [ 903.758148] shmem_alloc_inode+0x18/0x40 [ 903.762209] ? shmem_destroy_callback+0xa0/0xa0 [ 903.766880] alloc_inode+0x5d/0x170 [ 903.770513] new_inode_pseudo+0x14/0xe0 [ 903.774495] new_inode+0x1b/0x40 [ 903.777954] shmem_get_inode+0x74/0x780 [ 903.781944] __shmem_file_setup.part.0+0x104/0x3c0 [ 903.786879] ? shmem_rename2+0x6e0/0x6e0 [ 903.790998] ? __alloc_fd+0x1bf/0x490 [ 903.794818] SyS_memfd_create+0x1f6/0x3a0 [ 903.798973] ? shmem_fcntl+0x120/0x120 [ 903.802891] ? SyS_clock_settime+0x1a0/0x1a0 [ 903.807313] ? do_syscall_64+0x4c/0x640 [ 903.811296] ? shmem_fcntl+0x120/0x120 [ 903.815192] do_syscall_64+0x1d5/0x640 [ 903.819100] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.824291] RIP: 0033:0x45ca59 [ 903.827478] RSP: 002b:00007f5a1ae01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 903.835191] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 903.839834] XFS (loop5): SB sanity check failed [ 903.842455] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 903.842463] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 903.842470] R10: 0000000003bfc6e3 R11: 0000000000000246 R12: 0000000000000003 [ 903.842476] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f5a1ae026d4 [ 903.936292] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 903.947762] XFS (loop5): Unmount and run xfs_repair [ 903.955298] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 903.963345] ffff888218a06000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 903.973409] ffff888218a06010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:48:19 executing program 0 (fault-call:2 fault-nth:3): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 903.984411] ffff888218a06020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 903.994793] ffff888218a06030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 904.013510] XFS (loop5): SB validate failed with error -117. [ 904.100035] FAULT_INJECTION: forcing a failure. [ 904.100035] name failslab, interval 1, probability 0, space 0, times 0 [ 904.119586] CPU: 1 PID: 12989 Comm: syz-executor.0 Not tainted 4.14.184-syzkaller #0 [ 904.127507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.136869] Call Trace: [ 904.139470] dump_stack+0x1b2/0x283 [ 904.143118] should_fail.cold+0x10a/0x154 [ 904.147290] should_failslab+0xd6/0x130 [ 904.151282] kmem_cache_alloc+0x28e/0x3c0 [ 904.155440] selinux_inode_alloc_security+0xb1/0x2a0 [ 904.160550] security_inode_alloc+0x8f/0xd0 [ 904.164881] inode_init_always+0x576/0xb10 [ 904.169125] alloc_inode+0x7a/0x170 [ 904.172761] new_inode_pseudo+0x14/0xe0 [ 904.176743] new_inode+0x1b/0x40 [ 904.180114] shmem_get_inode+0x74/0x780 [ 904.184098] __shmem_file_setup.part.0+0x104/0x3c0 [ 904.189035] ? shmem_rename2+0x6e0/0x6e0 [ 904.193111] ? __alloc_fd+0x1bf/0x490 [ 904.196925] SyS_memfd_create+0x1f6/0x3a0 [ 904.201079] ? shmem_fcntl+0x120/0x120 [ 904.204970] ? SyS_clock_settime+0x1a0/0x1a0 [ 904.209382] ? do_syscall_64+0x4c/0x640 [ 904.213365] ? shmem_fcntl+0x120/0x120 [ 904.217269] do_syscall_64+0x1d5/0x640 [ 904.221168] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 904.226360] RIP: 0033:0x45ca59 [ 904.229548] RSP: 002b:00007f5a1ae01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 904.237270] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 01:48:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0x0, 0x7}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xe8) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f00000001c0)={0x4, 0x7, "4e9fe6e6907e28bdfe857a6c2aebeff36f279f93bd0a77715406fed2fad81d91", 0xffff69bc, 0x80, 0x3, 0x7, 0x36}) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r5, r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r8}}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r9}}]}) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x5}, [{0x2, 0xb}, {0x2, 0x2, 0xee00}, {0x2, 0x2}, {0x2, 0x2, r4}, {0x2, 0x1, r6}], {0x4, 0xe}, [{0x8, 0x5, r8}, {0x8, 0x0, r9}], {0x10, 0x7}, {0x20, 0x2}}, 0x5c, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) [ 904.244548] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 904.251822] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 904.259100] R10: 0000000003bfc6e3 R11: 0000000000000246 R12: 0000000000000003 [ 904.266374] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f5a1ae026d4 01:48:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f00000001c0), &(0x7f0000000280)=0x4) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x5c, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6475e0ae2b177fe239be55f59097c2224d0160d9255faad0b1fc3cc0984065a5188576fcc641a33c678e0b1ae3a89cab3fc93b359315f9df22ea474b351853b42bda077f849d6bea15c165fbbebde62ef4a30e0ff86e2d813d48972f7d2fbeb523caf7e982622ce1bc73051b197f7e604e07c6a09905e1c133d40de745a891edd16c17ef1ad398c8a2b7aad6920505b57a08866e522fc0959d669100da805599728aac9ccd9d8871fd9f70422409be2424e40a552d1a9a38ba49a2cea9d33360cea1bfa46941e28eff51329cb859ac2e87fbf8b376b5d893b98837766bbc2eef68", @ANYRES16=r3, @ANYBLOB="000125bd7000fbdbdf25080000000500120099000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000020}, 0x4000800) 01:48:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 904.393661] ISOFS: Unable to identify CD-ROM format. [ 904.505522] XFS (loop5): SB sanity check failed [ 904.511131] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 904.549917] XFS (loop5): Unmount and run xfs_repair [ 904.570823] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 904.588452] ffff888088b66000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 904.608700] ffff888088b66010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:48:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000001c0)=""/208) [ 904.628838] ffff888088b66020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 904.652672] ffff888088b66030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 904.675808] XFS (loop5): SB validate failed with error -117. 01:48:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = socket$nl_route(0x10, 0x3, 0x0) readv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000240)=""/142, 0x8e}, {&(0x7f0000000300)=""/182, 0xb6}, {&(0x7f00000003c0)=""/248, 0xf8}, {&(0x7f00000004c0)=""/9, 0x9}], 0x4) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r5}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) connect$can_bcm(r2, &(0x7f00000000c0)={0x1d, r5}, 0x10) r6 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66566c746572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$sock_inet_SIOCGIFDSTADDR(r6, 0x8917, &(0x7f0000000000)={'vxcan1\x00', {0x2, 0x4e22, @empty}}) 01:48:20 executing program 0 (fault-call:2 fault-nth:4): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 904.747949] FAULT_INJECTION: forcing a failure. [ 904.747949] name failslab, interval 1, probability 0, space 0, times 0 [ 904.774113] CPU: 1 PID: 13074 Comm: syz-executor.0 Not tainted 4.14.184-syzkaller #0 [ 904.782032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.791391] Call Trace: [ 904.793993] dump_stack+0x1b2/0x283 [ 904.797652] should_fail.cold+0x10a/0x154 [ 904.801816] should_failslab+0xd6/0x130 [ 904.805797] kmem_cache_alloc+0x28e/0x3c0 [ 904.809957] get_empty_filp+0x86/0x3e0 [ 904.813856] alloc_file+0x23/0x440 [ 904.817409] __shmem_file_setup.part.0+0x198/0x3c0 [ 904.822349] ? shmem_rename2+0x6e0/0x6e0 [ 904.826415] ? __alloc_fd+0x1bf/0x490 [ 904.830319] SyS_memfd_create+0x1f6/0x3a0 [ 904.834487] ? shmem_fcntl+0x120/0x120 [ 904.838380] ? SyS_clock_settime+0x1a0/0x1a0 [ 904.842800] ? do_syscall_64+0x4c/0x640 [ 904.846788] ? shmem_fcntl+0x120/0x120 [ 904.850724] do_syscall_64+0x1d5/0x640 [ 904.854638] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 904.859838] RIP: 0033:0x45ca59 [ 904.863025] RSP: 002b:00007f5a1ae01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 904.870742] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 [ 904.878023] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 904.885352] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 904.892635] R10: 0000000003bfc6e3 R11: 0000000000000246 R12: 0000000000000003 [ 904.899913] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f5a1ae026d4 01:48:20 executing program 5: clone(0x20026134ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c706572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) r2 = accept4$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, &(0x7f0000000040)=0xe, 0x80000) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0xf8b4, 0x2) 01:48:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000000)=';:\x00') 01:48:21 executing program 0 (fault-call:2 fault-nth:5): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x48000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000080)={0x7f, "48928ae96711a2c665a251db5da4999cdecf9c539caf6480b1673816df698375", 0x4}) socketpair(0x25, 0x3, 0x6, &(0x7f00000001c0)) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) lsetxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x1ff}, 0x16, 0x3) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={r3, 0xfff}, 0x8) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000140)={r6, 0x101, 0x6719}, 0x8) [ 905.203938] FAULT_INJECTION: forcing a failure. [ 905.203938] name failslab, interval 1, probability 0, space 0, times 0 [ 905.223287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 905.253481] XFS (loop5): SB sanity check failed [ 905.259897] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 905.298472] CPU: 1 PID: 13138 Comm: syz-executor.0 Not tainted 4.14.184-syzkaller #0 [ 905.306397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.315761] Call Trace: [ 905.318365] dump_stack+0x1b2/0x283 [ 905.322009] should_fail.cold+0x10a/0x154 [ 905.326173] should_failslab+0xd6/0x130 [ 905.330158] kmem_cache_alloc+0x28e/0x3c0 [ 905.334324] selinux_file_alloc_security+0xaf/0x190 [ 905.339351] security_file_alloc+0x66/0xa0 [ 905.343594] ? selinux_is_enabled+0x5/0x50 [ 905.347835] get_empty_filp+0x15c/0x3e0 [ 905.351816] alloc_file+0x23/0x440 [ 905.355364] __shmem_file_setup.part.0+0x198/0x3c0 [ 905.360299] ? shmem_rename2+0x6e0/0x6e0 [ 905.364357] ? __alloc_fd+0x1bf/0x490 [ 905.368170] SyS_memfd_create+0x1f6/0x3a0 [ 905.369285] XFS (loop5): Unmount and run xfs_repair [ 905.372316] ? shmem_fcntl+0x120/0x120 [ 905.372330] ? SyS_clock_settime+0x1a0/0x1a0 [ 905.372341] ? do_syscall_64+0x4c/0x640 [ 905.372352] ? shmem_fcntl+0x120/0x120 [ 905.389309] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 905.389589] do_syscall_64+0x1d5/0x640 [ 905.401603] ffff88821a9ff000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 905.403918] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 905.403928] RIP: 0033:0x45ca59 [ 905.403936] RSP: 002b:00007f5a1ae01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 905.427209] ffff88821a9ff010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 905.428813] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 000000000045ca59 01:48:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind(r0, &(0x7f0000000080)=@rc={0x1f, @none, 0x1}, 0x80) [ 905.428820] RDX: 0000000020000030 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 905.428827] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 905.428834] R10: 0000000003bfc6e3 R11: 0000000000000246 R12: 0000000000000003 [ 905.428840] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f5a1ae026d4 01:48:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) unlink(&(0x7f0000000100)='./file0\x00') r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xf8}, 0x2) 01:48:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x8004, 0x0) [ 905.637158] ffff88821a9ff020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 905.670700] ffff88821a9ff030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 905.717895] XFS (loop5): SB validate failed with error -117. 01:48:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0/file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0xffffffffffffffa0, 0x2}], 0x8000, 0x0) 01:48:21 executing program 0 (fault-call:2 fault-nth:6): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 905.893728] FAULT_INJECTION: forcing a failure. [ 905.893728] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 905.908729] CPU: 0 PID: 13216 Comm: syz-executor.0 Not tainted 4.14.184-syzkaller #0 [ 905.916649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.926021] Call Trace: [ 905.928627] dump_stack+0x1b2/0x283 [ 905.932267] should_fail.cold+0x10a/0x154 [ 905.936435] __alloc_pages_nodemask+0x22b/0x2730 [ 905.941205] ? check_preemption_disabled+0x35/0x240 [ 905.946233] ? perf_trace_lock+0x109/0x4b0 [ 905.950485] ? perf_trace_lock_acquire+0x4b0/0x4b0 [ 905.955428] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 905.960276] ? HARDIRQ_verbose+0x10/0x10 [ 905.964354] ? avc_has_perm_noaudit+0x157/0x2a0 [ 905.969039] ? lock_acquire+0x170/0x3f0 [ 905.973033] ? lock_downgrade+0x6e0/0x6e0 [ 905.977195] alloc_pages_vma+0xc1/0x4b0 [ 905.981181] shmem_alloc_page+0xe1/0x180 [ 905.985254] ? shmem_swapin+0x180/0x180 [ 905.989237] ? cred_has_capability+0x11e/0x220 [ 905.993820] ? selinux_inode_copy_up+0x180/0x180 [ 905.998580] ? find_get_entry+0x31b/0x660 [ 906.002745] ? check_preemption_disabled+0x35/0x240 [ 906.007873] ? __vm_enough_memory+0x261/0x460 [ 906.012387] shmem_alloc_and_acct_page+0x126/0x670 [ 906.017339] shmem_getpage_gfp+0x388/0x27b0 [ 906.021686] ? shmem_should_replace_page.isra.0.part.0+0x10/0x10 [ 906.027856] shmem_write_begin+0xeb/0x190 [ 906.032031] generic_perform_write+0x1c9/0x420 [ 906.036638] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 906.041323] ? current_time+0xb0/0xb0 [ 906.045138] ? lock_acquire+0x170/0x3f0 [ 906.049129] __generic_file_write_iter+0x227/0x590 [ 906.054074] generic_file_write_iter+0x36f/0x650 [ 906.058891] __vfs_write+0x44e/0x630 [ 906.062621] ? HARDIRQ_verbose+0x10/0x10 [ 906.066690] ? kernel_read+0x110/0x110 [ 906.070599] ? rcu_read_lock_sched_held+0x10a/0x130 [ 906.075630] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 906.080396] vfs_write+0x17f/0x4d0 [ 906.083946] SyS_pwrite64+0x116/0x140 [ 906.087750] ? SyS_pread64+0x140/0x140 [ 906.091632] ? fput+0xb/0x140 [ 906.094746] ? do_syscall_64+0x4c/0x640 [ 906.098728] ? SyS_pread64+0x140/0x140 [ 906.102710] do_syscall_64+0x1d5/0x640 [ 906.106608] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 906.111797] RIP: 0033:0x4168b7 [ 906.115042] RSP: 002b:00007f5a1ae01a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 906.122758] RAX: ffffffffffffffda RBX: 0000000000509a20 RCX: 00000000004168b7 [ 906.130038] RDX: 000000000000007c RSI: 0000000020010000 RDI: 0000000000000004 [ 906.137313] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 906.144592] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 906.151866] R13: 0000000000000c1e R14: 00000000004ce6db R15: 00007f5a1ae026d4 01:48:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:48:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrlimit(0x1, &(0x7f0000000000)) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c856572000000000000008000000000000000000400000000000000000004000000a563cfe7ca28ab5fac9d8ab2c33b36f9a8f4e83cbe21603af4a2800fc060862db7e56a7d3f1b08b8a1e7ab90a58418d522570a41c013049d9b7637dd2960060cbd7b079c5d9ad4ce6e76748a7b1ca3e5f89b00"/130], &(0x7f0000000080)=0x2c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0x5, @private0, 0x80000001}], 0x2c) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 906.407081] XFS (loop4): Invalid superblock magic number [ 906.468252] XFS (loop5): SB sanity check failed [ 906.473207] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x1, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x40}}], [{@fowner_gt={'fowner>', r2}}, {@smackfshat={'smackfshat', 0x3d, 'xfs\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) prctl$PR_MCE_KILL_GET(0x22) [ 906.519939] XFS (loop5): Unmount and run xfs_repair [ 906.563678] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 906.615294] ffff88821ad0e000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 906.639359] ffff88821ad0e010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:48:22 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x82101, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x10000, 0x6, 0x1, 0x1, 0x1}, 0x8) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$FBIOGET_CON2FBMAP(r2, 0x460f, &(0x7f0000000240)={0x28, 0x2}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r3 = socket$inet6(0xa, 0x2, 0x100000) dup(r3) r4 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x2c) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f00000002c0)={0x9f0000, 0x6, 0x1f, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x990965, 0xc90, [], @value64=0x8}}) getsockopt$inet_dccp_int(r5, 0x21, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0x4) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) r7 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r8}, 0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000100)={r8, 0x101}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000001c0)={r9, 0xfffff625}, &(0x7f0000000200)=0x8) [ 906.659117] ffff88821ad0e020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 906.668274] ffff88821ad0e030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 906.702344] XFS (loop5): SB validate failed with error -117. 01:48:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x200, 0x1, &(0x7f0000000000)=[{&(0x7f00000001c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000002d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c0930ac4118ae7d489bbf86839895b9c50cb63efcc8b966ad43913f45cf315b58f53a919f1ed9cb999eb5f0dd1e28004c0f34d24456faf25afd70526bb271df1e9f8610a76bab235ceb090db3722a7f5602a91e592c2eae992e84", 0xd3, 0x2}], 0x0, 0x0) 01:48:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10d001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) recvmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/215, 0xd7}, {&(0x7f00000001c0)=""/220, 0xdc}], 0x2, &(0x7f00000002c0)=""/136, 0x88}, 0x10000) pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKNOD(r2, &(0x7f00000003c0)={0x1, 0x13, 0x6, {0x40, 0x3, 0x2000000008}}, 0x25) 01:48:22 executing program 0: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000040)=0x5, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:22 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x54, r0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_TTL={0x5, 0x6, 0x6}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x100, 0x1}}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x101}]}]}, 0x54}}, 0x40880) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) [ 907.082457] XFS (loop5): Invalid superblock magic number 01:48:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "e57f4e654ae22eba7a38fddc88b058c8e65d58b5"}, 0x15, 0x1) 01:48:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc663}], 0x0, 0x0) 01:48:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r5, 0x4112, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0x0, 0x1, 0x5}, 0x6}}, 0x18) r6 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) splice(r0, &(0x7f0000000040)=0xba05, r6, &(0x7f0000000100), 0xffff, 0x6) 01:48:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x408400) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000006000000a563cfe7"], &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r2, 0x300, 0x5ea, 0x25dfdbfd, {}, [@NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x6}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x10, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @broadcast}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000100)=""/7, 0x7) [ 907.438483] XFS (loop5): SB sanity check failed [ 907.445821] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000000)={"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"}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66e96c7465720000000000000000a563cfe700ff00000000"], &(0x7f0000000080)=0x2c) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000800)={0x1, 0x0, [{0xc0000001, 0xbe, 0x0, 0x0, 0x101, 0x7ff, 0x100}]}) [ 907.481053] XFS (loop5): Unmount and run xfs_repair [ 907.494394] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 907.539227] ffff888095e88000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 907.575111] ffff888095e88010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:48:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) [ 907.604458] ffff888095e88020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 907.632155] ffff888095e88030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:48:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = accept4$ax25(r1, &(0x7f00000001c0)={{0x3, @bcast}, [@rose, @netrom, @default, @null, @netrom, @default, @bcast]}, &(0x7f0000000240)=0x48, 0x80000) getsockopt(r2, 0x3, 0x20, &(0x7f0000000280)=""/100, &(0x7f0000000300)=0x64) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0xdd1, 0x8003) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465720000000000000017000000000000023813dd9c1f5259f700000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$USBDEVFS_CLAIM_PORT(r5, 0x80045518, &(0x7f0000000000)=0x1) r6 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) fcntl$dupfd(r1, 0x0, r6) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) pipe(&(0x7f0000000100)) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = dup(r7) getsockopt$IP6T_SO_GET_ENTRIES(r8, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0xd}, 0x3}, @in6={0xa, 0x4e24, 0x1000, @empty, 0x7fff}], 0x78) [ 907.652110] XFS (loop5): SB validate failed with error -117. [ 907.810039] XFS (loop5): SB sanity check failed [ 907.814767] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x1ff}, 0x8) [ 907.865938] XFS (loop5): Unmount and run xfs_repair [ 907.880370] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 907.905057] ffff888218488000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 907.928000] ffff888218488010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 907.945733] ffff888218488020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 907.955213] ffff888218488030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 908.007722] XFS (loop5): SB validate failed with error -117. 01:48:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x84, r3, 0xe10, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x713}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x77}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x47}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7ff}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x210000, 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "51a95386454faed6aedecb8b98fc82763c1dfdc9f7290e3f0a9258aefdc338cdcb988319b2f123c8ee46671e0f9d19afb558c02187345eb7eff71f30c1b934f735cd871f03b8c8ce27a5ed67ca74154847d79fd42c2d569306281e30a67822d2be2f936318873a787496c8287d5ac3326cf94c6e988d7c7ee191dbf348790b6dad3aaeb277cf67f9c93f06f856f01db26b79614557f48894c28128ba852dbda3a71739fb7f7bf3a1cd73a35c86f79237a9919babd92d2091f31480d44cc95fc6f780ffa0"}, 0xc8) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 01:48:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000c681f98600000400cfe700000000"], &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = dup3(r1, r2, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x1, 0x10000000, 0x0, 0x2}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000001c0)={{0x4, 0x2, 0x7, 0x7fff, '\x00', 0x8d}, 0x4, 0x40, 0xffffffff, r4, 0x0, 0x8000, 'syz0\x00', &(0x7f0000000000), 0x0, [], [0x1, 0x7, 0x77, 0x3]}) r5 = socket$inet6(0xa, 0x2, 0x0) sync_file_range(r3, 0x8, 0xfff, 0x2) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$UI_SET_PHYS(r6, 0x4008556c, &(0x7f0000000000)='syz1\x00') 01:48:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x7, 0x5, "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", 0x0, 0x40, 0xd0, 0x2d, 0x6, 0x1, 0x47, 0x1}, r4}}, 0x120) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000002d1c000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x5c, r5, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'virt_wifi0\x00'}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x20}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 01:48:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0', [{0x20, 'filter\x00'}, {0x20, 'filter\x00'}, {0x20, 'filter\x00'}], 0xa, "97d70ddc754ce8954df7663dce4dd149d58424291c68adb3497c7cba0fa4c2c3c26984d79c50e7c7d1658e82bf0f0013980d46d9cafb6f0e611139c0c0677c8e999eacfc55c9f3c063385da4f89ae4c9e55287c613ae4283b80600a9263dabcd6573b899d8508a881b6d088b475f5544bda6a9d3685a807f417c688b4e"}, 0xa0) r2 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r4}, 0x8) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r6, 0x84, 0x79, &(0x7f0000000000)={r4, 0x1, 0x20}, 0x8) [ 908.318608] XFS (loop5): SB sanity check failed [ 908.324009] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 908.382363] XFS (loop5): Unmount and run xfs_repair 01:48:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 908.404860] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 908.426408] ffff8880a0874000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 908.461291] ffff8880a0874010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 908.487821] ffff8880a0874020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000404000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) acct(&(0x7f0000000000)='./file0\x00') prctl$PR_SET_UNALIGN(0x6, 0x2) [ 908.545042] ffff8880a0874030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 908.582802] XFS (loop5): SB validate failed with error -117. 01:48:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x7fff, 0x2, &(0x7f0000000000)=[{&(0x7f00000001c0)="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", 0x13a}, {0x0, 0x0, 0x105c6fc6e3}], 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000140)={0x6}) 01:48:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x8000, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x262100, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) close(r0) 01:48:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e24, 0x1, @mcast2}, 0x1c) r3 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = dup(r3) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r5, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x4084}, 0x42) 01:48:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000000)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000000c0)) 01:48:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffff6, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x8000, 0x0) 01:48:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x154, r3, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x22}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1c}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'wg0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7d6c}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x101}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xa364}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x800}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_virt_wifi\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x13}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffff001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) restart_syscall() r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) r5 = accept(r4, &(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000140)=0x80) ioctl$SIOCRSGCAUSE(r5, 0x89e0, &(0x7f00000003c0)) 01:48:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, 0x0, 0x8000, 0x0) 01:48:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f00000000c0)="30d67e226727e9b0523440cc6d2c7019b871bf71cc52850bc2d622f43c8d7b1e0d89cd6296b28920728a971322ddc4704a309558d5de25435ddc56303830303c3d3a6b15d2ca55ea09a36a86236aa7bc4544c370e3fc74774f59666eff3a346628fdbf45e00c8b9ebe294dcd7558f3180081ca045338499273685b023c253727b86c8a6825075512d012380701776eb4c97afa4dc8bab7669fd6640ae3a25c2d328a98371b1ef6ea1b475079e610c194", 0xb0}, {&(0x7f0000000180)="6b9042110da38fcc17ae44caea5066c7fbef7a397fe3c662de59bc8053fe13f35647635c61f9af0a617463cf08628a7741da000288e962ea55e8956c82164af5cad84b572a7b94c228db1bc6b843528c548f509c3a00083b1c8cb5ef72f0890c596a2d75215a29e8260ad8165cd38e842d2340e3f6f0fa5ce178ac31d765c2cb40916f9e8fd31683adda29ba618b745005bccdcb8e11d3aaa2ca195f7af53a6c6671e65845865f6bf1dfa608b5ac60af6ca5", 0xb2, 0x2}], 0x0, 0x0) 01:48:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x2}, 0x8) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x461, 0x3f, 0xca8}) 01:48:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e22, @private=0xa010102}, {0x1, @link_local}, 0x34, {0x2, 0x4e21, @loopback}, 'bridge0\x00'}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e0}], 0x0, 0x0) 01:48:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f00000004c0)="35a14c81609fbef335b5153e20d75c9fb42a2daab865bee73783b94420a440709f4168a5d5d0076d174d9663a0b60bb872ea9f6fc9dc624b17ba3b9f254e17bc787abb7339f96e69a76b8bfcfaf20912465e5a3d03", 0x55) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x130) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000300)={@private, @local}, &(0x7f0000000340)=0xc) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f0000000140)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x60, 0x1412, 0x1, 0x2070bd26, 0x25dddbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x4044848}, 0x48090) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r3, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x884}, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x20, @loopback, 0x3}, 0x1c) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) socket$inet6(0xa, 0x80000, 0x9) 01:48:25 executing program 4: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff01, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000005000000000000000000000004000000a563cfe700"], &(0x7f0000000080)=0x2c) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000000)={0x1f, 0x4, 0x1}) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r4, 0x7b9, 0x9, [0x3, 0x0, 0x3, 0x6, 0x0, 0x3f, 0x7fff, 0x5, 0x9271]}, &(0x7f0000000140)=0x1a) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000180)={r5, 0xe5, "73ffccb35a7f7eaf35fedbb3beef60c806f303cd4e71fc9a15efc57481eceef882b9ff30e289dee2d90c21fd43f7e73d2698e9ce54258381dbae838bd9217bd315b9de01e4f1ac92df54a2a853f939c62d11f9d6d9be9c491ad2677666aa835566450bbb3ba3060c5704136cc23e2c97096a45383f0ada449448206cd63276ad07887ee00cffe3cbb801d20583e3c63916912cffb77aa453a31f70fb7888025ec0341d9536c3c5dfa2c5f7c9a341c8f30dd918da5916f782a9f0f71e2db2209cc3ea334271f377a7d237d8713ed2c0b5963e7de8a7a9068c0b3a30c3155f48db4d108245b9"}, &(0x7f0000000280)=0xed) 01:48:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000200)="00000004", 0x4, 0x8}], 0x8040, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x100, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/igmp\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000380)='./file0\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x140b, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x4) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000140)) [ 910.232863] XFS (loop4): Invalid superblock magic number 01:48:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x7) syz_emit_ethernet(0x14a, &(0x7f00000001c0)={@remote, @dev={[], 0x29}, @void, {@ipv6={0x86dd, @tcp={0x8, 0x6, "306c8d", 0x114, 0x6, 0xbea9269e0ce46ff5, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {[@fragment={0x89, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x67}, @routing={0x2, 0x4, 0x0, 0x0, 0x0, [@ipv4={[], [], @broadcast}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @dstopts={0x16, 0xc, [], [@ra={0x5, 0x2, 0x1000}, @jumbo={0xc2, 0x4, 0x8}, @generic={0x9, 0x22, "e09cea477e1e5add1dba3c965d5ad87e6e005045bcbdcdf5a0b82a219c31be3bf531"}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x13}}, @calipso={0x7, 0x20, {0x0, 0x6, 0x2, 0x100, [0x9, 0x1, 0xff]}}]}], {{0x4e21, 0x4e21, 0x41424344, r0, 0x1, 0x0, 0x5, 0x10, 0x1}, {"bc483b43804f6ac9e6a8060d07bb5e4af6d5a46e3c2fe802b1717a55d970dd82079b3c62b3a668e11a5038d3d861bab8be4f00ac9d4e1ff6b756144e8436b1b80c868647eee59d83ad8938421925d35a1b0827f746d7e31d978f77aed6045f2d"}}}}}}}, &(0x7f0000000140)={0x1, 0x2, [0xc0f, 0x538277f3, 0x29b, 0xbeb]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:48:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$alg(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a0196e7395b03a81d727292a92c27426db7fac56d531cb69c4", 0x19}, {&(0x7f0000000280)="72e9d95b493962b88b99a79f410d4c29891bc72f51ffcb24dbb2e8c1afacf269527a0d889a28cb4db9568d4d84d06e536a3f0ce890bba61494585c9c5d6b40ec9eea5b3e2413bd86e785d457ee79d56c1e9007ce97a9c710df7580f53b695a1d5e633873fb25094d0fd01a0765f1d6cdf9d50cb9f4c7a509bb44c740", 0x7c}], 0x2, &(0x7f0000000540)=[@iv={0x80, 0x117, 0x2, 0x6b, "69a66abc059552c30fc59afa5dc8f3a5cb5f02ba0c1f798011717e18f640a1c6010f359671a840299f0f829d6fa566e3c516aa4243f0e6d844afe057b3068c3b0939dbd835130646f55c440ff455199ec096e8a9eaa45fa3d29f84187f18daf6a1ef7879bd33807f746d51"}, @iv={0x60, 0x117, 0x2, 0x4c, "1dc515e632d44026b2440ab3e0139594b8f8b1b4c5e8df1b7fae1c34fde814d42a6e7d3c53da7d595ddc177badf4ce3e1991e5a2e4e64deb328e147687480b20e565c1256ef7802640ebbf85"}, @iv={0x100, 0x117, 0x2, 0xe7, "800ff9c1ab4c08f6bb11d18a31a0f830a2c4f00c54f1113e6fff5c1d1fa890c5c32c8ecdd888fddf3b1885b5b2f62b0239147631af5b50d8c53defaecdef6cc024779f1f4675061d517982cc6164ec0982860c0718936b6732b1b60aa0465f639a56693022d4e8e4b12b92e74ca58e78f2415b4e41a1e4e72a26ba70b2caa0e46691008b4cb866d88f4c7a204032a1dec6ea43b7445781c68e3b343f2b12ae42b78ecd67de25f66e966cd7741f9c434f9fd0a7e88fa6496ba3164b83b5c3a1db54b315fd7fe5e7e98a6e9d46e8f5365bbee2a6c367f146565e3112aaa1062042f819b402bdce87"}, @assoc={0x18, 0x117, 0x4, 0xffff}, @op={0x18}], 0x210, 0x40000c0}, 0x48004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r4}, 0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x7fffffff, r4}, 0x8) [ 910.382694] XFS (loop4): Invalid superblock magic number 01:48:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x8080, 0x0) sysfs$2(0x2, 0x1ff, &(0x7f0000000000)=""/33) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) pwritev(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="f99ee9abe8eece58c8c76bb903a725c7ee4a9e8715e5ef5fecbf0da185462f6adfcd0abbcd28d3e8a66e35bc07040f8b0db64deb4e9991b6987a1395e6c137b27c1f5de4087d9f1f6269f6e024649d52d042ba81ba669f243bdb608e826d22003d223dd1ffe0d162ba5bd362a8a690293f96d4eea274a56381e2afcbb664d84411b09bf2b22e1eb6cd5a0c9083", 0x8d}], 0x1, 0xf55) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'hsr0\x00', 0x800}) 01:48:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@gid={'gid', 0x3d, r1}}], [{@defcontext={'defcontext', 0x3d, 'root'}}]}) setregid(r1, 0x0) exit_group(0x0) r2 = socket$inet6(0xa, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}}, 0x0) timer_getoverrun(r3) r4 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r5 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x3a) getpeername$ax25(r4, &(0x7f0000000140)={{}, [@bcast, @bcast, @default, @bcast, @null, @remote, @netrom, @null]}, &(0x7f00000001c0)=0x48) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$midi(r7, &(0x7f00000000c0)="5bfba61e66bd8ce337a72a5fc1717544f68ddd01a1f12e7ac1528e108166fa3c7b869d5fd7b8c2168046c9de31ebece9bbdc995cd89dc8ae765e88bb205eb7b907ccd4e55463407829afc51d432de3e2411ef1255b1b86ff7c24c824f60a37efc0ce0930b0d4a64211", 0x69) 01:48:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f0000000040), 0xa0800, 0x0) 01:48:26 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x74deefc3) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x6c, "470000288a06100fb81a1b6519f1fba40a18d2d03d1935f7774baf0eb37ebc58da3be06337f8289f6b8e513b895254412f1b156b348233b7ee3635b75569ebd9515aca22d62c971a6c2d837a69ead6a8727019ce9a145fe5c641dafdba66b640c0415faebadd85025955d356"}, &(0x7f0000000000)=0x90) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f00000001c0)={0x81, 0x0, "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"}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffff8, 0x0, &(0x7f00000000c0), 0x208080, 0x0) 01:48:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000000)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) chroot(&(0x7f0000000000)='./file0\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="674466980100000003000100020000002ec0fd6f1178bfd263f83568e0b4e44ac117a5404581bab755dad23ba25752cefe6f62275ee4f2f9b6a8d87a87d04eb9a4b94cd221e12877fb077ea01b1896cd7f0b6c03bf5f7f6ee6067938767609a31c95e950b3fe04fc744938160b3e46913ccea2f96d11ebf39adc5038938cf632fe71a9cbc09a865b7274057bd3532aa8636657a6e87e5cfbc099a3fb95e10342f6e64f7d"], 0xa4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x6, @mcast2, 0x8001}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e23, 0x7, @mcast2, 0x3}, @in6={0xa, 0x4e21, 0x100000, @remote, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e21, @broadcast}], 0x94) 01:48:26 executing program 0: clone(0x200022057fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) semget$private(0x0, 0x2, 0x550) 01:48:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d00000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7a}, {0x0, 0x0, 0x5c6fc6e3}], 0x1200021, 0x0) 01:48:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000040)=0x8) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f00000011c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e2}, {&(0x7f00000001c0)="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", 0x1000, 0x8}, {&(0x7f00000000c0)="e92f454f7d2d8fe01dae793b514e6d90e13ce08b3d5c0aa6fef5e7bfc5d4cbad29a66e38b9d977d86041c982b4b6dae267", 0x31, 0x3}, {&(0x7f0000000100)="3aee6c73704605fa00c452747279ee9b242caa1b7a7b848f3d1f79cd17bc9df8a5ce8dfdf22919d0bb313571fa1ffb2d01e2be640ad81d4bb1d21d856ac050b31a1a38cc852c5cd54b427ed1259c22bda7e4c4be137d7f2f41b0860b372ed70ba9fd50066d835eea8d15b0fcac1443ae31d93a49ea27b921d09c5d", 0x7b, 0x732}], 0x0, 0x0) 01:48:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) open_by_handle_at(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x42000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x7d, 0x1a, 0x0, 0x802d, 0x0) r1 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x2) fremovexattr(r1, &(0x7f00000001c0)=@random={'btrfs.', '&\xa2^+-@\x00'}) 01:48:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4947, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) inotify_add_watch(r1, &(0x7f0000000000)='./file0/file0\x00', 0x1000028) r2 = dup3(r0, r0, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18, 0x0, 0x4, {0xdf99}}, 0x18) 01:48:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r1, r3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="11d2677d", @ANYRESHEX, @ANYBLOB=',\x00']) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r7}}]}) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r9}}]}) r10 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x3}, {0x2, 0x1, r0}, {0x2, 0x1, r3}, {0x2, 0x5, 0xffffffffffffffff}], {0x4, 0x4}, [{0x8, 0x3, r5}, {0x8, 0x3, r7}, {0x8, 0x6, r9}, {0x8, 0x1, r10}], {0x10, 0x4}, {0x20, 0x6}}, 0x6c, 0x5) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x10, 0x0) 01:48:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x400) inotify_rm_watch(r1, r2) exit_group(0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@v2={0x5, 0x1, 0xc, 0x4, 0x64, "2beda33438b9874c079b7f7d705b7250e25cd0fd32a3b69a28f923e4483396a88b5bd30eabac7609bfc8f7c188159efa46ccfb53fb93b2541794162e5eb368fd6021970a8be6fa033cad7cc4a8659c7c155cee85b217d12d24f2c7fd1f70d56813cdb324"}, 0x6d, 0x2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaab45, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "b116cfe7"}, &(0x7f0000000080)=0x28) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040)=0x8, 0x4) [ 911.413482] XFS (loop4): Invalid superblock magic number 01:48:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x12a, &(0x7f0000000340)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) ptrace$setregs(0xd, r0, 0x2, &(0x7f0000000480)="c5aa4c43ffc330227663f1971d5875ccaedf57f9cfbdffb7d7a83d1ce58be251972ef6e8493f7ea09ab8d2d5cd45e71a08b5dec650bc421cb7b4211dfb5c10191251510a48c45b822e2f20a7ab18b9e68852555c03622f51e1c670104912843bf1ebc3fb582ef73a6703afece10bf7595a3048e6149de3405183fd680618326163813b2ce200ddc01a5606ad7ab759a52bf7bd39bcacfd4498a260af1b6715bdc5586caa025691ee7f26f05df8b872e4091564db0854cd8279115918c29ea5461e517d7dda6677c51a634d8bc3ea60c4d11a5ebd9a6cc4ca5ee5b0d80675b41c1877f8edd76e91000000000000") ptrace$cont(0x7, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)='F', 0x1, r2) keyctl$revoke(0x3, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r3) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)='F', 0x1, r4) 01:48:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c746573000000085259915800000000000000006dc082bec718903e23deb3fe0400434a8289cd5bd9470f83c0c55da650d8cec3c81b0c6499b8b7ac22c383a44a83af54c967fc00"/84], &(0x7f0000000080)=0x2c) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000200)={'raw\x00', 0x143, "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"}, &(0x7f0000000080)=0x167) bind$alg(r3, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) 01:48:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000000)={0x7, 'veth1_to_bond\x00', {0x4}, 0xd4}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="584653420000100000000000000010000000000000000002000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a0206acdca2e7b8c3c17e6a25041352fd7168ea004818b850bc5f10a466e231cdf608acd8c843b588a1c29b8d89739e43dc9dd5ae1136d33abe457a7bc8ee48e551d9d09ef8ad7fedbb4799e1568e4c00d00e717600012a65607e0fbc4d60bad73a29083de9a2817009c8dc7c1385dd2a5f0bc2ba7da0cbdee2bc7866bc2db568c3d5e02ae9603051e063e148872e555d54d908bb63244bd0500122859738891b398ca27b996567ac7e2a626c8df25a3310385a5bfa13e4ceef34062afa7167c2e882627669c377b0ecf74b15759e1351c886b662bd57d025a859131d9668714f", 0x15b}], 0x960402, 0x0) 01:48:27 executing program 3: socket$phonet(0x23, 0x2, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x12088e0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0xffffffffffffffda, "78cf5db1c1000000000000007b69606d49b4"}, &(0x7f00000001c0)=0x28) r2 = socket$inet6(0xa, 0x5, 0x3c) r3 = socket$inet6(0xa, 0x3, 0x21) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_LINK(r4, 0x40044160, &(0x7f00000000c0)) r5 = dup(r2) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r6, 0x40305652, &(0x7f0000000140)={0x2, 0x4, 0xff, 0x200, 0x401, 0x3, 0x348}) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = dup(r7) getsockopt$IP6T_SO_GET_ENTRIES(r8, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r9 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r9, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) fallocate(r9, 0x8, 0x8, 0x2) ioctl$KVM_IRQFD(r8, 0x4020ae76, &(0x7f0000000240)={r5, 0x200, 0x3, r4}) 01:48:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000100)=0xc) r4 = gettid() r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000002e00000227bd7000ffdbdf252000000008002300", @ANYRES32=r3, @ANYBLOB='\b\x00}\x00', @ANYRES32=r4, @ANYBLOB="08009100", @ANYRES32=r5, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x200440c4) ioctl$sock_proto_private(r0, 0x89ed, &(0x7f00000001c0)="13a613f00c40c62653256c0be6fd80a5a2b58cc07f5856a85f6c43f93f5b8b0722b3e1bc26a9cfcf669be073850782eb0465b96e8bd0762160e76853bd4fe129cce9e599405006f70d98d98e90a9e6a4ff67c6b41e7fa9eaf57e8ae15b7c3e1875e4ffe9025f99127fd79332a7f26bf6864275b27be3e55b4fe2b9fc52406d79ea22c3c5309e1388435e7729b3ef075404483f41f5f69ec1098f90a80c660ebb9e2694e9850e228c6edb64c8bb2fa0c73bbc928e9d0c4618bfd789a1a6dfd5258db1") 01:48:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x8c0d, 0x0) 01:48:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@loopback, 0x0, r1}) 01:48:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0x8, 0x2, 0x0, 0x3c3b, 0x2, "7755344cb6901a69"}) open(&(0x7f0000000100)='./file0\x00', 0x525800, 0x18a) getpid() ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000080)=""/70) 01:48:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000020004000004000000000000000000ec00000c090a0200000000000000331564f79fa9a0a7bdb43736349a199050135a54f6d7c32bbf47300c6aa297f14cfe2db9fd9c8b33551bfd14db45c8ffe4b392caad", 0xb1, 0x4000000}], 0x0, 0x0) 01:48:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)}], 0x1c018, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/65) 01:48:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0xf, 0x4) 01:48:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f0000000040)="01b4c8d95c907ecd3e21edaee1a0ce382328ec3ad0b727b1d4d175b0e1fe2de1a8621caac084193bfa6de84b74b20e5a71ab2f93", 0x34, 0x100}, {&(0x7f00000001c0)="223c0880f65e045b4f46f4b8802a49bab788cc260ba682ca66d039861050da4620b93a88c6f06fac9e5719bd0376975828cb2b051df2273c6ac404d863a0297220e4006209414fcce863db50a091d39b1e511b59417ac93736ee5cbe1247a081faa26a156ba0966800a3f7ef920089323ae904992bc59f9ffea661fa786fbcba384bd57ea75af62607c4f267fd1df0da385f2a6c2e624618d076e27088e6d6bfe034f21c6a2ecae8cab26c6ca7fa9cee148c5404539d9c436ff1043f53b6211833e9a296e9e157507c7abf36503a8eb7653def5063354f0cb94600742198bb8536", 0xe1, 0x910}, {&(0x7f00000000c0)="a99b38d3ba5202eca4c69a473fb1e04ec2f8a9fe5b57a3ba2bd3d58d01635e00f7e69960745a3ac036da67a99c57d56f5a270781b07cce45332b58f1ffa4cbad0e56189bd7200988e7118269d5dab1c845bfc783dcd6824cf3333045049e679dd9b3089eaa0557230940db75fad9bdb75327422e2ed4c9d2e7cc82c2da8e5520df39011692ebe172138194b18532f862f8710d9fb01ac80c45e87bef9ee2adbc39", 0xa1, 0x8}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) 01:48:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r2}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r2, 0x84, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x3d}, 0x1}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x0, @local, 0x2}]}, &(0x7f0000000100)=0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x204, 0x0, 0x5a7fdd333ab895ec, 0x7, 0x0, "9111860186047b4836b4202766e2718f2816df5eb6cec5e69602f61ed824e08247b1510b594fb8b9df7daa2de6683c559bc59abc51ea713b481e660478777790", "0f59f947a3b90b1f02f4a018d8cf69913ef377c91956572a797779811c5bb73205ede81a462e14d6432f172db6f20166e8013e214f77272bfe069ca75ef5b2f6", "854d787e3cf5ff7f098c00c621f20f1f7e42f4c97954ea8b84f2e5c6569c91f2", [0xf8, 0x7f]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0xef}, {0x0, 0x0, 0x5c6fc6e3}], 0x1004884, 0x0) 01:48:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400300, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x6, 0x1000, [0x0, 0x4, 0x7fff, 0x800, 0x7], 0xf66}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000000c0)={0xe, {0xa, 0xf8, 0xf8, 0x38, "5b6b0fc2a533da86da966cc817a3ec81bdfed5e8c47adeeda9a9a2d2c565e242f3c1cf94d062565bd7bd6fa4ecd1d8095f1a370db731a128"}}, 0x44) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000000)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, &(0x7f00000000c0), 0x8000, 0x0) 01:48:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x0, &(0x7f0000000100), 0xa000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x64, 0x2, 0x7, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x20}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x21a}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x48040) 01:48:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x8000, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 01:48:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66697c746572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000000)={0x10, 0x0, 0x20, 0x7f, 0xe76e}, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) 01:48:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x101, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000000)={0x5, 0xfffffff7, 0xffff, 0x40, 0x7}) 01:48:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x96b42, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000140)={0x164b9de2, 0x5, 0x10001, 0x4, 0x7, "e8ac6ec2ad6760278c595a203183a147f2f8ad", 0x80000000, 0x6}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}], 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xad6) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x402800) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r3, 0xc0245720, &(0x7f0000000040)={0x1}) 01:48:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x1410, 0x8, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x1dc01be8, 0x6, &(0x7f0000000500)=[{&(0x7f00000000c0), 0x0, 0x5}, {&(0x7f00000001c0)="86a86142d487167c273d987024729b55ff65fde059fe9ddd5f85fa8da5acf01e472cb0fca72650ca1222b43f75f876d6621f749c951711d06315f46f47cb247d20ffad768ddcd291907217f7ab7c72b30d60e935c5968f61a01ef90fb02420b698e4b11c0fa32dc06fb93a971aec1414f31530478c3b4b03dbf0da5e3bdc14c0890140ced9d8329710e57a6f3e64bc", 0x8f, 0x100000001}, {&(0x7f0000000280)="8d1ee65627b5b5e869a168725b4ba1e86d6367c99e7621236eaf5517b6b3d9a3e45dee8196c8df36583558bb725a825e606f1fd77f90b402824b9a59868f39ad65e08dfd7026b12220a1f6385e34f4d12c41ee2566e86c0aaeaf1efc3390837a7748825a8c0b8272dda851e5d952596b7d8991adbff5c0a562bca88b153a552e7587b9e25525e06661c349c92ba8c8469e692b57c973cf0cf7b01eecb2fe866dd0108dc147c44c9b4ccf51c978b1c1ed2b53a342b3f3340d785e76dc93b25bff0774c5ca4bd10d83e102b160dd58358d027a9e", 0xd3, 0x5}, {&(0x7f0000000380)="06a81df2f3981cfe3cb8f3d5abf7446467f6572ad7be10a6386e2dbf27e47d708ab9eeafe305fbc5d4d8aa3786daa29404fd4fcca85b7d47a3f46b2adbb107a85bd4ff07dfc9a03e5efc8d3ba71703f4eaed4a129f0ff20ef71b55b5ff26ba4fe207975e238ecc6e698ee309c660acb30b4c487c757b0b06bce2d4e6aca5618968eeedc13d08d59e11", 0x89, 0x1}, {&(0x7f0000000440)="c6b98fca6f1c14058dfec1d3da9d661c2237de322dda71064972945f69ea0a813618c3a1bd3ce5ed92c48a101808c1e1299000f606d755691d51cb99121d82e98fe82cd3fbb1b5cc3b4b12b12a65aa5e1e6f71c0d6e99ce759acf85482bab5daa14b64aa2f823c9fe4ea3de6270ce9dee30b5e7a369513fc08440b2b4112bf1f86aecf", 0x83, 0xfff}, {&(0x7f0000000100)="ab0d16b900fd0d69fb3ad30515803a523c47e42ae61895c040747813bd80541cea933a8bc9c993df2e4879775653198be17395b9c46b772cc84e82dad679e9a2509b2c343b762895157a00cc6d33f869758927fa1ebce0caf5337347dda7f29f67933c57ee2a068a5002", 0x6a, 0x7}], 0x10006, &(0x7f00000005c0)='xfs\x00') 01:48:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, 0x0, 0x7, 0x401}, 0x14}}, 0x0) 01:48:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='task\x00') connect$ax25(r0, &(0x7f00000000c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}, 0x48) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 913.470842] audit: type=1800 audit(1592790509.316:1873): pid=14272 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16597 res=0 01:48:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)=0x0) lchown(&(0x7f0000000000)='./file0\x00', r2, 0x0) 01:48:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 913.533554] audit: type=1800 audit(1592790509.316:1874): pid=14276 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16597 res=0 01:48:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/235, 0xeb) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 913.656624] audit: type=1800 audit(1592790509.466:1875): pid=14286 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16485 res=0 01:48:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'virt_wifi0\x00', 0x40}) [ 913.730680] audit: type=1800 audit(1592790509.576:1876): pid=14310 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16485 res=0 01:48:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 913.885719] audit: type=1800 audit(1592790509.706:1877): pid=14324 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16261 res=0 01:48:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e21, 0x7, @local, 0x9}, {0xa, 0x4e20, 0xffffffff, @mcast1, 0x3}, 0x3, [0x3ff, 0x7, 0x9, 0x0, 0xdd0, 0x6, 0x1f, 0x6]}, 0x5c) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 913.981383] audit: type=1800 audit(1592790509.816:1878): pid=14336 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16142 res=0 01:48:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 914.112304] audit: type=1800 audit(1592790509.956:1879): pid=14349 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16391 res=0 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:30 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) sendto(r0, &(0x7f00000001c0)="9f8f0adc87842d15bf93d1b30eb2a8f9ce10e4426c39788def1d01d9ed7c4a931b7abf42c925c84ccbd18eb13d280c15f38cfd453588de23680b8538e7286493d9363ebeb29cbc4946264bf7b990e0611e7709d0d1d56092899c8d30a028926b95d8b455c867ac5e8c634f8caad2e1fc5f04bab014e8e9168fc3431e9d17b3cf84a1c2f84b6660", 0x87, 0x0, &(0x7f0000000280)=@isdn={0x22, 0x1, 0x20, 0x20, 0x40}, 0x80) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x29f02957, 0x5}, {0x1, 0x101}]}, 0x14, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x282a00, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000300)=""/84) [ 914.278984] audit: type=1800 audit(1592790510.126:1880): pid=14359 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16134 res=0 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) ftruncate(0xffffffffffffffff, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cddc24d6c831688f615cf84a1539b4ee030a2f818ffa1e67199f325db681b4f2ae28aed02964897376d16b686f997c44ee3bbf379eb7fe946a8a59", 0x3b, 0xf1}], 0x401, &(0x7f0000000280)={[{@grpjquota='grpjquota'}, {@errors_ro_remount='errors=ro-remount'}, {@grpjquota='grpjquota'}, {@expose_privroot='expose_privroot'}, {@resize={'resize', 0x3d, 0x20}}, {@notail='notail'}, {@balloc_test4='block-allocator=test4'}], [{@dont_appraise='dont_appraise'}, {@smackfsdef={'smackfsdef'}}, {@euid_gt={'euid>', r2}}, {@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, 'filter\x00'}}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000100)={0x3, 0x1, {0x1, 0x3, 0x0, 0x2, 0x2548}, 0xfffffe01}) 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) ftruncate(0xffffffffffffffff, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) ftruncate(0xffffffffffffffff, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 914.801820] audit: type=1800 audit(1592790510.646:1881): pid=14403 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16134 res=0 01:48:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TCSETXW(r2, 0x5435, &(0x7f00000001c0)={0xf268, 0x5, [0x81, 0x5, 0x20, 0xe511, 0xbc04]}) r3 = dup(r0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000140)=0x28) getsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000100), &(0x7f0000000000)=0x4) 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 914.942982] audit: type=1800 audit(1592790510.786:1882): pid=14407 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16140 res=0 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="c4000000072280b700696ec66aa82134da089352d2f5dd27bc30f906868d00000000f3382c47d6b514e125eccfc0417459718a658f40246eb4fa9b21d7071b557d7d302e6e2bed01000000000000002ef6a3c2451aa7dc9329531282b4bbf8591c7722da349edfa6436fa330f55e3147c27372c1a324f81017d94373322b38280ce1c00200000000000000e3006ba3c6f6152b795a70ded5ff01c4b6ebb350c61708e210a7b6676c039447e340e2c3da6bc7ba3a96b55be16d5320bb4a3116e8fb07d3dc"], 0xc4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socket$l2tp(0x2, 0x2, 0x73) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000100000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000080)={{0x1, 0x0, @reserved="252aa6d7890deae763d039197d19ca4c656258b1473cce1213bca6f825d57e1e"}}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000500)={'nat\x00', 0x16f, "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"}, &(0x7f0000000280)=0x193) accept$phonet_pipe(r4, &(0x7f0000000100), &(0x7f0000000240)=0x10) 01:48:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffff7, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)='XFSB', 0x4}, {&(0x7f00000001c0)="38d37b01ef4ebb4e1cddf0d94af4cc4c346fc5a2f0906945061c03560861f58a7a66d371b711da6393d8cb6d4f4aa9004b365a6cf8777b8489e059fb199ae9beaff83827740920c832fdb59f12c450caf56a269c3cce4fc96c6197e12963ce464ba8b93f34e470a0c8e32d351c08b59d7a60fb0ff797b271a73ac0260286e42547249caaba72266b1bf764a7438fdab596653543f72f7414da84a6bd3692b266ebbcb3bcc98f3bc7cbfe6eecff616b7bee749b7bb24bbf54eef4176d699f265586a46eef808c5fa3afac5c829eeef83474e036942eb887a6443e89a8983e6477e9ff7413591120b38ca6890ce68e", 0xee, 0xdf}, {&(0x7f0000000100)="69a3bdff158d61aa88e8aa1a9d66738492461b75d2aa835b47283dde991bb9bd494a2722c57e3bf7c48801cad3892b0ec46eeadf227117c391ef279ca49bee15caad9d34349a6e6bf98cc4bee856ed5fc524cc3914aeedf193d8d39b7a0d1c226f611200a67574ae02b702f210ce25aab0cc9c99b785f099795e9d46042d88", 0x7f, 0x4}], 0x8a003, 0x0) 01:48:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000000140)=[{&(0x7f0000000100)="8f4a2db2bd05692b", 0x8, 0x8}, {&(0x7f00000001c0)="a7a2d4284bf2cffdf009d9ab81e5520fe46914213a60d38dea42026b94579a8477dbac3939f3974fde9b029ab8fb55883bbb951b28af96665618e1731125d71fb9b64c619165a87804db66f337453df4530d7315cdc92342bc39bb919a7e361a88d80989e29a62557b64ff0140c0db5f3848dc0c3c58a5e7f23d6649a5df2c230349f17c26ae75b7c7412fc58aabf3654fab1a93b5fc23a14f27cc8acddb296653d58ac8c86a3f4c51ec4a9a42c1e3717da5e3a1376ab0cdcff3a1197a7b13e0310efd1507ebe7bd6d2eaf43b8b09c26ea373633ba162137b2e943ed878b3d308fe46f51109af1d45ed3e45d9ed22e2db8f95fcd25c7e3", 0xf7, 0x800}], 0x201040, &(0x7f00000002c0)={[{@sysvgroups='sysvgroups'}, {@usrquota='usrquota'}], [{@smackfshat={'smackfshat', 0x3d, 'xfs\x00'}}, {@dont_appraise='dont_appraise'}]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000440)={'broute\x00', 0x0, 0x4, 0xc9, [], 0x3, &(0x7f0000000300)=[{}, {}, {}], &(0x7f0000000340)=""/201}, &(0x7f00000004c0)=0x78) 01:48:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x6900, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000080)=0x68) 01:48:31 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_VERSION(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB="04000000e3a7cd4800000000913342b32974f3a21cbdd452c77a", @ANYRES16=r3, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x60045}, 0x20004080) sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @rand_addr=0x64010101}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x10000001) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f00000001c0)="5846534200001000000000006666568e1007fd3361237100001000000000000000000000bdebbd084c988cb008a636fd0000000000000034fb8f7f680100d17b6ec2b9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d88fa00000040000d890000000000000d8a000000010000100000000001000000000000035ab42402008d7f1d629f87b7aeaea25f8388421e4dabd8b447303a412cc9f9e9d1f20735d6600f3af5a64a4d3e0726e91c22ff3f1adb2a351707bda67ace99b7", 0xc2, 0x1}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 1: lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xfd14) r0 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r0, 0x2007fff) fallocate(0xffffffffffffffff, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000140)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x40000000000002, 0x0, &(0x7f0000000280), 0x810080, 0x0) 01:48:31 executing program 1: lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xfd14) r0 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r0, 0x2007fff) fallocate(0xffffffffffffffff, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 1: lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xfd14) r0 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r0, 0x2007fff) fallocate(0xffffffffffffffff, 0x100000003, 0x804003, 0x28120001) 01:48:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f00000001c0)=0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x9) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7400000000000100000000a60004dbd4724657cfe7"], &(0x7f0000000080)=0x2c) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) readahead(r4, 0x7, 0x26) ioctl$SNDCTL_DSP_SUBDIVIDE(r5, 0xc0045009, &(0x7f0000000100)=0x800) 01:48:31 executing program 1: r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 1: r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696d746572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x7}, 0x20) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$snddsp(r3, &(0x7f0000000100)="3160fe2d5ec2995de7243d7e2eb13f389484db60efe0428f4c6b5550158fd7e5ac0787ff92a762605fde2eda462a9c2db4b413c7ed5c9af093", 0x39) syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x5, 0x28882) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:32 executing program 1: r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x10, 0x70bd25, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) lseek(0xffffffffffffffff, 0x75, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000000)={0x3, 0x6, 0x61, 0x9, '\x00', 0xbc8}) 01:48:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00') 01:48:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:32 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fff, 0x4400c0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) io_destroy(0x0) 01:48:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000580)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x8000, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x10000, 0x1, [@default, @bcast, @bcast, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x6, &(0x7f00000004c0)=[{&(0x7f0000010000)="7bfe73d7", 0x4}, {&(0x7f00000001c0)="b69714bd078ef37a5d1d92c3285866379c6607db820021f27b7f590769a898d26df3a9561a780850b5bf73b2c7df405ad5993ba84fcb7e517f1d178570804cb6c12fc1915ddd9d5545048e9203c655c83589645dd1b9f711d2f1a959ec0f3e3f6a0cde3abd43fc1c4d7dc028e7cad556504ffd891109c8e6ad09a1edb5806d8cca44e8cdd856184d3eb621a4448f067efe4698c0c050a5bd65c0bd545f8c8ae85121df4f325ee56b69b901681c46c4dca25ae7bff737933e84a55ccd74e107e1a19bb233", 0xc4, 0x5ff6}, {&(0x7f0000000080)="2c1dbe7ac885c6f34737485ea235eb1d9658c4aa1ec4d73cb55752da5a85ef4f8bccd3e9b607c834d1c00e1f66ba46d4932797fc8e2b03b6aa9cfa0085371c7ddf6ea4f45328728db849fa4338e10b02840362ec8a21de952c67d04fa15fbb4d6645158f2cc02cd50d9151d8a49fa3a3f0f481fc9303bdfff2e6231d80b488b1051fd335ddef91dded8a5c4bd3bbec2c9ac0ae78baffb2a28455909f32efe60ec2f673f6a5c57eac03fffcbec9a7d74c89a5e610472a7cdbe5d7688889cfdc82feab77f5", 0xc4, 0xff}, {&(0x7f00000002c0)="8d6dc4d5a052c0a16853f4b8d6cc712e53411a6360d4f7faecbf165698b62351ad200b29550691451645b658acb829466ae03f18791ece6a489889f145aafece8a968666db61ee427cf16a91c807e810559fb9bbf97032a0ae8e", 0x5a, 0x7}, {&(0x7f0000000340)="1d413bfb7f7b879fd03b3a3568bd6209b4d1f4d2ce6c3cbc8b17edf6758fc4e6f2ccdf282c202a5a29955b8019bff9cff5c90a13f6dd4aa7b3a1bd85ce07eb086696d06667080bab19343eb52a23469749fabe68fcd2b1527670c7d1277ef319ef3100d09d25b4fb07164e6dd7130d027c7d8a775d03bebf8e44a64aaa58d5bc5444df7ced85c9966fd898123e3c29d5851209cda2025dc4eaa4c2b0adbfd8d9cc669307735da2461c09486600a7eb9e753b", 0xb2}, {&(0x7f0000000400)="f83947dd4b7075ec02dbb406915dbba91475e3239f74738d6f3d883b72fbff18aed39f7194cba1529f37500c5c530fa565fdd34d8c9f6a3cc9f0f416f1c7f7226274dee175004e27711c06a9902d9e3b65f41116085e15e8607f9a0bd41736f355e6d5865a9b9f28226ed4798c8c7d3572abdb94ba4b90aa1fea9da2f5a6f04d70cca4debcf4e5ed8c", 0x89, 0x400}], 0x110000, 0x0) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c400000", @ANYRES16=r2, @ANYBLOB="000126bd7000fbdbdf25020000000800010002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48011}, 0x4000) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8004}, 0x10840) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c9cd528, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)='XFSB', 0x4, 0x4}], 0x8000, 0x0) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socket$inet(0x2, 0x5, 0x1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) socket$bt_hidp(0x1f, 0x3, 0x6) r4 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x6}}, 0x20) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x104000, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000ddffffffffffffff0000000000207bd65479770cfab9716a0604bc8504000000a563cf"], &(0x7f0000000080)=0x2c) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f0000000340)={0x2, 0x80}, 0x2) 01:48:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) fcntl$getown(r1, 0x9) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) r4 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="726177ea000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055dffe7a40f2fa95a4bbb319a2658f57249924dc3e876680b1d476def639e58c64e2195eace055f6b9a7ad9bea674d94e5fa157d1f74"], 0x78) r5 = socket$inet6(0xa, 0x2, 0x0) dup(r5) dup(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000340)="4f9d5a0b66e3a249cfa93c281026235a73dbb3dd701fc75a7f") setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000001c0)={0x6, {{0xa, 0x4e20, 0x3, @local, 0x7}}, {{0xa, 0x4e23, 0xffff, @loopback, 0xffffffff}}}, 0x108) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f00000001c0)='syz1\x00') ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x0, 0x58c, 0x2, 0x1f, 0x1, 0x8, 0x800, 0x1000, 0x8, 0x2, 0x8, 0x94, 0x9, 0xffff1ed9, 0x100, 0x0, 0x7, 0x9, 0x8, 0x56, 0x7ff, 0x40, 0x2, 0x9, 0x40, 0x3ff, 0x0, 0x9d, 0x2, 0x1ff, 0x1, 0x2]}) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffd, 0x1, &(0x7f00000000c0), 0x9800, 0x0) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x11, 0x1, 0x5, 0xe, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x16, 0x4e22}, @sadb_lifetime={0x4, 0x3, 0x4, 0x1a, 0x9, 0x9}, @sadb_ident={0x2, 0xb, 0x1, 0x0, 0x8000}, @sadb_address={0x5, 0x5, 0x6c, 0xa0, 0x0, @in6={0xa, 0x4e24, 0x2, @empty, 0x1}}]}, 0x70}}, 0x4008000) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, 0x0, 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, 0x0, 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040)={0x0, 0x50, 0x4c}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'sha3-256-ce\x00'}}, &(0x7f00000001c0)="792b3141618bc0292f07129e232c6778c5ed62ee3e32729abd2a7e1631e0e4387197c09c1d99edd9b52aed1ec3d78caac4b9f38ff52d73269d5bb8197264287fd648742eb8b54334e53510f2ebe5298d", &(0x7f0000000240)="93c512bd992c6e76ac835d191cc33a246eb1202868d2548fdec8f28d25214bfd8135659663c844a542cb9adb8fc199f999fa1f44af2bf5cfd4d0aba0b7b9bb6a8e293e85faaad8681ea62747") alarm(0xad) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, 0x0, 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(0x0, 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000000c0)=0x304) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(0x0, 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 01:48:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(0x0, 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4100, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) 01:48:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000001580)=ANY=[@ANYBLOB="66696c74657200000022c7436b0919000000000000000000000000000000000000000000000004000000a563cfe7000672e202a233cfc9ad5aa11f03e98809940e4491a6345fdc413729aba459fd69603df8ebd4dbafee5f17ae30ce75d5929626ce3fc237ce06240492e7994959ce055209c15e1eda35a4381ee37be100000000000000"], &(0x7f0000000080)=0x2c) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f0000001540)={0xc, 0x43, &(0x7f0000001480)="846fe3fab8762fec84d1e47511f8ec64a72a1351defd97c8ec91f126c586731ba57210e00c100e06a52eff1c1da1b99191fe60241c3a43ecb919400ad35f99a71d6590944bd6ac08ac469637836b55852af6a153c99b9ff5ab3e3fc69c47ce516f7f16fd748d94aadd047c376f7e48d1637bf59a3768bcfca80a54ff4339b82e24f2fcb57e7dbe6af8304502f2d507", {0x20a8, 0x7fffffff, 0x31435641, 0x14, 0x2, 0x7fffffff, 0x4, 0xf566}}) process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/242, 0xf2}, {&(0x7f00000000c0)=""/79, 0x4f}], 0x3, &(0x7f0000000140)=[{&(0x7f00000012c0)=""/142, 0x8e}, {&(0x7f0000001380)=""/232, 0xe8}], 0x2, 0x0) [ 918.874334] kauditd_printk_skb: 31 callbacks suppressed [ 918.874343] audit: type=1804 audit(1592790514.716:1914): pid=14767 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir775661663/syzkaller.NNiA7V/2102/bus" dev="sda1" ino=16107 res=1 01:48:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000001540)) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="381300001500200028bd7000fcdbdf251535d10001000ae32cef1a1e75a7a0257f49594f33c8c59ebaedadfc23f592f345cd74c6278ef11a2d1eb89904313cc9194476300927d345596ea8bdb4f9319995fc3ae205e0f20f0491b85904b061a3441ce3a5f32bf325f2c2e06a1bf6a33c1086f3903504e9bf9bfa87b2ff91ca90680301f5297ed212aaab4245b529c47e4bd9034ca7b362280709fb2a5b1996c8f68bd1233a764d099c67f099ca0f3ca2a1f2f6d82a5ab149ae24fc2702fc2bfbde7c99d62d52154dfb691be75066f55acd2640fbe8e613ff10c4b0a68f95bd89c6ad54000000ad000100bd6e33f4e7d156fa522b8b61312182ad96dffdcc7a97eb21315f5f12df727b512b3484882b0e1b13068977a72ffbc4bb80f48f7a882e89016fac8dd253bf50f772e14824ab2c9545243e0f0e0c47114c78e741065c8c41db174073e3402289f4f0cff0efbf23cde22e6408a242b949f3b1880c9993d17905f34ef60ca97582ee9813c28d39a6074a72d540c8404dd730f13409aa178777e3b39b7d05d7917ed53d26462bc518c60079000000b8000100a8deb80b0a6c4c1d96e35027d7a9409abadb3e4d2e2de433be5d840a6f8fa14092cfc85094eeb6fd76837e34449d0f2eeae8113ede3d911aa0f59a34438ec1a75bfdcf7347f18ac8f9b515d250c705a77882d8bd84e3e320d6364fadfb454f574282df601cdc44aa20965cca94d9443542e33f86c47a555562e24b91923e705ca368519b5070df133fdeb14b8f3d8af23df397a8597807e0ad771e39e7db89c28db80ef19e77cbab4f7346c9ac29a676ba852eaf22000100343f05f160bb3564c9fb9da57a39365f9634bd80521a037373575ac53c0f0000041001008ca27109b7886a2e5f2551a3c209098edf07c5ddee57ff3c0acd44577ac20bf6f2be9c8ed62a77688e320b77aa920e6d25b522509b6d043c05e219d1c65508c9b8442b723443fe8fd02950a102783563b49303723ae447382bc6836913b3382e5caa29729b10d0a8cef91da2ebc4b215a16c539d42859d0c6fd6a1fc02bc86b3ef0db173ad33d61babd9aba7598923494eecbf331ca970597fe69d166f86254623f25a3f0b4282f07534d1fcb879e3a88b6cc5bf4fa20145caac3a80d99931a33c9bb7ed9a263e1702cd8d016fa00e8f17327ffceb02d86fcec5fd7afea7facdab540d9983fa2a1fc96516de7d461f776cb2e669e95127abc18e3fbfd63d64b8440e9bf702eee0884e3d7f7c4469d3836783145351db3496c4a44a90b3d015509f2b80ad1ff5b38b7ee5e585cb5d032e80e6af6b7fc6ea9a3670606f804cd5c8b71867ab5c3500d6b50ad568c7d2fe7d4ca7dd3f34c17da4971a9b26e2cbb9833be585377be4fbcfaf0e7a1fe7198bcaac32e84fb8c6d5e86fcf73a68985a30eca494b0ba84df1ea2906b9f224d966c64daae8efc1dc60bb4f693730b2c918c489e0bb8883b1982656f6691b4bb42434740edb6b7ee980140b16296c30fc07a54fe669953397938c0ec3614f522a61364ab51d8fab1f092137d904dcaf6ae55de759b55f5c08df1d1aee5c594593813e03ee384c2048747f752c47626f10858fd3101a380539c106bf016cf00a667aeeab810132a05c66e768fbb59eb62c445d45f53b2344f053ff42131891595ff9bcc75ab1ae5ca8d3f770fd0319c5d04f63e9b54b78671d6c65d36cd0f7a43dcc27e2bb8bda02b7fa3ce686c16ce88be98b20bdb094c89ef0dccae9be5e2feb59988a00c2748f7a21059cf466f4e1f3107d8948c1be7a302e641b7a471d3997f3c8c4ed9ae779ad89f7cc43d77f472ca31e0b781d1c33c06b31e5a00b3aa8e82dcd588d53f66ccae9c4ecda5f7dcf84e281df9e81777c4f924e0e28b81530e311a912a284ab1ad0a30363b0c0630cd8dd5143fb29cbc3813ab5fbe3805e66d2b43349a68cd109cc615e04b705cce06ad9a5315d2d438ea238eab3472900db53b810fc99d06ada077f8bb3f981468a3b09b78a626f9c59de7369b5f6fd243ec4bb5b90c5f127251d5f21c53f8e1739542da511d4f434a986c89c5c86dc8160e548bc15d01f34ca8fc92ef3132ba73409f610367db38ec8e23f4979650205d5bc0f500f34110270fc35b4801579712f453cf9c40aade26943069feb82793152e521906438b4408565cb64d57be9c7690e5fabe12b98f71c7a833f01a1ac9f5146aaefc5e8b851deb064034c81c6ee05616b68b3dec4ceda679999d367f947965b4e8eb4c7ed3a3d5238011e81cf419ad4f1dcf25eae2df80cbacd0a1ca2e43d729f2afb2bebeaa7243d8a1e321333277f973e13052e1083a2f3b8556ed35080059f4eb30dc9ac2d0eb74300ddb359fce3f908f7652f03016e948d4f1548d470eb72546da8f21abb6300aa42b9d2ac8f2321a2b546254e2f053b7a102199d3aabb9330934a20147c1d063dc9a3e94c91e5741ccd3008246e8b95882f6003360eaff7a19238b053ea2fcaa7442f04b9311a1a54464b5756f2c3fc77c799a7d3d12902045376b90a8a3c3a769def9c3f02a1480b46afb11c5ef2ca9fd1a5728e05353642666c069aae17b669c6c20e952b3bd1caad767d80f0ce8c2fec0bdff6da5ffaf66975525349fc6d368e395bdb3aa6d9d8d67586676a6cb6537b659e08d88e9cb6c98d4528db82038610e19ce911e091aaa318481eaa1255222a2a6cbb1b554df0cb67fc9adb6c66df92b4eba3d462867eec348445fbc05dc56cb9f3e33d0e8c0caa7c104ad3a571f73e107955ad4d3cb6509673b69cf618fb8dc317397e43576b4941182e1b91643f3115ee793e8460c48ec18eafb7b507ba84f2a4c49f49f671b69d9be22ced174981b1a68e721767820401d409325d997f9d4153427ded75aa1a38727d7352e5c1b756b0e027fece14d847aa629052d997fd7970fc244b5e5edb65e37bab2720beb2fc4da797fb466cc01afbcf7ded6030cfc9c8e3513a8ce0febe78ed7d26820d45667c0e3c1658bf011658bc974f9b58b9086baec05c373d118bb60bcc36d18bce652d081738397de2628462a25ec20527bd81ee2fbbcf57935b6a26ce0f16a2a3f118711d87bd00ce8f36d602750639478cfc82fe23f03a45da6fc29833c27b463bfa8db72fea7f6a59a909568e727b13e0f5b6c74c7738e23c801adad980372da1f63fb816816b7177529bd00e49b9ad05666e7fddd213d2576dbbbd6ef80898374ca0a89952edd6e5a19c50c07b675fca86167ae46cd42af61b906c3208db3970eee3669f902bf14086a282aeccf5e3502a5a9bba2f615ef95c27809690a23be6c502e299672b8ee38a510741af501eb5335b568f9cd8a4706ee6ff4895a55fd482fafd6c8fd22c56146ab17a9e4aa6ec394e373f1bac35ba21e3f9d1c6384755476d5008677decc2a714fd97d5a23141f4323d4e7aa0eae8fd327958c889c83552ac2901857dcd10dc5bf55b3f03ad83e8f2d0187d267621e37fd36fac9472a2673628d7fbc7b0cc41d92f4e873de1e544d31c54e5b40caf81848c5a14835db0ca069759f71b512a5a2b2d30fcaa61995d129506064cd26d122d0837eedc6e99a83bd1065cbf48579d697c1b3365c18b1b89af34a5fc6ae7307442c2b7b977d81f3364b79bbc6a9dadb786852d969f51a96d26bd0bd96c096ea233e6eefe0ad2ca68dffb7fbd22eca913dc87501495dfab654cd80a1ec829c5b73f1f8a3002c444a572bd11a1da797aa04498c733e7b31600e87317a90b9ed488bc963b55a156cd614c0553f3f4e01db136d268c3b2b8526bb8ae6743e3d03e523b1e55879f7ee98b2e84ba3bbae5b87a20da8998529019a4e6b5e2843b45fe5982786884692a91240929d77e3dcede7acf6ec8659cdd5127935f150c5366d70e0f01da56a30eed5c0b55d2c816901123e34f5f3c40de9ef9c166b08a76bb51293a43d2a09c790b7a995206d5dc084414a30e7035686a1ba75ec140a199b719359d3e977aa0bc19d3b89ab30f5613f18602b43ecb996d8fe780dcef7df8eab7879107bc5b3796916283a8287c50bfa43fb07da09c0370404946b10f521590a86782d590e84ce18053ff9ec6e00369c61677ba86e9fb88dbbe8adf913c98f509e7d24c7401a3d5967c9f789e08ea91415637898b1fa6cbb1681c7b67b2ed50079d48c675a3a978ba340520d9f5266e224594ea6e743cd3d93f1bcb5d5fab28ccb7c2b67fe96cd48b171075880eda50b0afd320c30e70a378c96324d50c385eb2d74c96a70fbbe44ba130fbdd01cffa7bd5a6e4a30b9797412baa86f6bcb113c38b7cacd82772928bc8fb47e37d9b531747857a468024846cdc9216797df7c08817834fa3e3d8d0a1447f5a89f16ddb914984247b785fe58f35289e4ec0bfd8987ee117379b7b6373264078f741a85316e4b88eb11df594a826688af4faea62edac779f590e35acac114fa27158a9b3f92482b53a5274686a2f87a49b30c834de08d92e73fec21abb3f76259cfcd945ad906c00e313534d42bd3aab510b115834743d258796f1703490649c398a9e9664e42599db0a8355dd060d0f3ea11fec2561641e1b703881784cfd2d6c37d926c9104f8ae9679d83d5738b271f93adafd96d450f7664653e05c5cfb718c9ec5510e8aab55959c80d500452ab1d7f60d9164f973ec1d10d4db6f4fc6b438980236faf65c1b0a2698ee46606452bb78b36717edecb1fc399ac99c0edfeb0aab5a875056994b74cd63b58864cb540c129f834a39467dc5845eaa14a5e7a1f874c419a8afa666550d1fb7cce4053777a1a5d358df1036efdfa7d51288b2f4d97010f42796f60d1022e7690bbe8d4c27851530ad390440a10c3e99662192fdb0e8d3c23c93bb4f144b9bbe1bd17fa0d6b51023c1b65a394e790cc3f97285c1aa9e4afc5656227a2cbb598e4f2ddc28a0732ba7b4174ee4f1a46fde6b9b58227ec03a8dca4d3f0420be6039d1beb0816f9143f022b8f69042de20e9b5cc38c8c3c340075eb2a300925ee0510f6d12f1c3016a721413669051af4f358ae205903d182415524288d642ff453e1a16370a81663c03f3a0dc56dd96e20519ae6efb10043a346e706eca670734880ba83fc6f54237f0c99db76cd16feae87ee2d5c70240dca282f819636d7d31b9086ee6912b6c977ec2180b71779145c7828a767c50905e3597c716f9ec1144102cb6f0b53d103dda259f2ec57918b46fadf5ecbad921995d2655c81b2e6a10c6dbbdd928ec09dc264c118fb73c9dd379cf8f4b37570de7743b413a74be8fd7585ce494651af520a18505a5d1204b86210834becf836b344091db3cd9702146a809cf407f690573330814004b876eaefdccb8fe9cb31b553b528c78b4249db727b9c3fd7dfd97ff13a203d354162596343367d67218d64a60cbd7ac0079c7ed818f2892bdc58af894e6563caac515555b800bcd3a82a8fb0bd6ca7449e93a27e70dc834d8c35d5b62e6e079a9a554ae18e9031e861ad59e84ec4b2a5632326e6593d4786247d751119c06d42674425890f8cf232f393da382752e2315a8107f9c37e6dd21f5140776137479132386eae01f0c91fb6097a78e30beea9382ecde3cc47959e8dd68a4e3967cc39d9f8d04356cb35fd1adb02384d5f287d4c45c55905dc4c6c2d90ce140534b881a446664e9d10fd97dd52be948388b02c60407b481df8580e64498abe179a62bddd5bebabcc9acccf1583cc7afc6c3531497231cbacf3c59c551c33f16f1bcb5c72d3161b0aa4f85a81c38945579d48df00f7fb3e5521f9086f5347dfe880acc9db4e9a6592ce74b117e0008c2e2256a5d59354f271a309d3cdbd6a92db4cd5ab7281a23edb3468108ac0354aa2589f11bf895b5bd75fbf4e1877547b29842db8c057167f9479964b57a7beca36424dd2715b98072b73fc9a485753197334174f0bc8a15893a96d1fd262f5875f6824ee01a681ee6985ec3974d9888712bf82bbbf36dc55d1f9a305c39aa1b37ebafd0311ad1360c9453547b3e352ef59cd1640f661a13d81ac4312763373279076a45643b98768190d1b5169e03060ee767508beeb8676287bc305a07edf5d23741c14a37e675966aa2c5b90b346303c1567a9fb26a9cec4a1a63b0d349477a683c317456f499be953ea4909d3cea295b2fa5ae4b9590bc2a10df13f229850fd9b4d43ccf0b91a0187d66a416f13310d6e260f1cc08230be008dd40482101fbaa3d718f44df31ddb1b0b47ea09b2706ae08ee07419ec9e9255c7e1db7d1d6038a44535543e302f711da572a306300d30990cfa23c7b15007e747a5c4d80711851a78b6e3ae47123417f6fa54a81923f56702be444b880f7f9a6d4ee6cec1d64bc564e5dfe61c3592197fc78238acbb73ebfc6548363623edbb7729da8e1c79413cff70c1fe5a65bcef7f6364b6abd45fd807d68fb1678959e32dd25ae359136cdc20ad368bce53bdbd1a51dc2bcd18c4f0aef50d74c1be249ba8473693eb938f6593b4eec07fafaa110dd4cbdc4899ab5e04675dabbde7abe7eac79cc868522a45de5a9a5f0176041baf723bc9e0afeb60592a9eb79b86b4cd57ecee0de9109d439f6f814e8b2e24849de2f13873803b86004aeb0b69fec1d3768d0b744e0a0db2bf8fd8705742bf8b5d3635225d06e1e46e2184eea4c2fde5cebd53a4925e2f863fe28dbf00010014622e6ae35e5bc6eb3785ed23479d2880bb8af2bc7c9478c2489fa65f6f3fe886c63b49eb5b797d243cf665b1af2865d76e4103e2fdc1be6ec1e13d6196ea56c0802ea790ad598b0b396357ee0e290e51c5593d0b3c83c6087d10a0d10e451ca1abe36a6cd3ee98dfe412e0a04c60c3deeb7ddf4bd3c2f4bfa321d58b035ae35b2a88834561a6a5891690fe005cee2383083e03d8104fb54720e514d7f4c73954a8cc2856c89f4e9c4621d62af2c72150f11b26042407"], 0x1338}, 0x1, 0x0, 0x0, 0x8000}, 0x4040091) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/input/mice\x00', 0x80) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x2a) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x488, 0x98, 0x250, 0x98, 0x310, 0x0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, &(0x7f0000001600), {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x10, 0x7}}}, {{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[0x4e21, 0x4e23], [0x4e24, 0x4e23], 0xfe, 0xc2, 0x20, 0x1d}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x5, @multicast2, 0x4e22}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x1f}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x2}}}, {{@ip={@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x10}, 0x0, 0xffffffff, 'dummy0\x00', 'veth1_macvtap\x00', {}, {}, 0x67, 0x3, 0x50}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x3, "d610", 0x1}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@rand_addr=0x64010102, @loopback, 0xffffffff, 0xffffff00, 'syzkaller1\x00', 'veth1_to_batadv\x00', {}, {0xff}, 0x67, 0x0, 0x44}, 0x0, 0xa0, 0xe0, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x800, 0x222}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x0, 0xff, 0x3ff, 0x6, 0x8, 0x6, 0x7, 0x937]}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000001b80)=[0x3, 0x3], 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) inotify_rm_watch(r5, 0x0) 01:48:35 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 919.198734] ipt_ECN: new ECT codepoint 7 out of mask 01:48:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffb70e, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02000000000000000000", 0x7c, 0xfffffffffffffffd}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 919.266860] audit: type=1804 audit(1592790515.106:1915): pid=14787 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir775661663/syzkaller.NNiA7V/2103/bus" dev="sda1" ino=16148 res=1 01:48:35 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmmsg$nfc_llcp(r2, &(0x7f0000003900)=[{&(0x7f0000000200)={0x27, 0x1, 0x1, 0x6, 0x5, 0x8, "5298ba4877276832009425244b15486c81aa4f54298583ee18c8782da64e19af63b22dab834d37154892aa7fe05b55bf9d64dcab32aa18c985133483f3eafd", 0xd}, 0x60, &(0x7f0000000000)=[{&(0x7f0000000280)="7ab53b97c5f4ac254e9f372cd8b1d8bd1c1442437b2c005d507772ffa3fde66a76e1435c78b174e7ef20bf10556112d50acb7bee2c2e2ee304320ad42527d52b25b21e47ca9c877961ecee25e92c2c539570122bf6b9466d3c", 0x59}, {&(0x7f0000000300)="eb5fd93cba6ed217e289e3d4b6471a06480cf489836dab685b43d0939bf5fa0ba7cd2f83987ce897b1865b10ee1f4d5486c696e9e57e1c871be1bd05abaab40d4ccbc260", 0x44}, {&(0x7f0000000380)="afbab1fdd2faac0c3140cca3cc0574f83423249c72150bfb629dd79e900e3132c347d7c9f37367e58885b779662fb8de1e8f6424df9f4ad132e5fe287d3cc14bc6a2bd965e2e9094e961b917", 0x4c}, {&(0x7f0000000400)="f8b2abc48edc22d236e592fe76b40980eef4a977506e95aff22be33b4e5ecffeb08e4556d5587f4f87ac898d0dd9bbc8ce5e2565d2da24cc31591f667a2dee7b26b569d0d2fc7235daa10f98f4a149c07995e1145ad64fa360c848afb8f608669ae938f3fb9e98e198fe3df8bff56d6338733cff6d9dfe1abea7a1fe174bac6eb3d1912d3beda3fd69694f575d53bfdcfce494ce3e8ccf1a19646d7ec05a9e5b4c9dd9662e16a60b793ba2e4d9c70b222e858267c465af321da55dcccb7e1df0", 0xc0}], 0x4, &(0x7f00000004c0)={0x1010, 0x11c, 0x8, "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"}, 0x1010, 0x8800}, {&(0x7f0000001500)={0x27, 0x1, 0x1, 0x7, 0x1, 0x0, "2a8880787513a0c311b7bae575509c2dbc1e6f67ddea81b335505ca3dfcf696b8fa199c58ff56fd92fe2c40276ed6c8e23bb5de211eda04c303bbcc287b30d", 0x3f}, 0x60, &(0x7f0000001980)=[{&(0x7f0000001580)="acfac70cd646522166688ee252483ea8e7c34aa7122965d3dc83da7aa2ace9fb428a3c16c20c4d512c16b08a91350075eff78e2423db86724a7449f8697b0d2e80ae1d992435351317044e8102778b976419de056ce4effd7c6d2e49f2eadcefa0e7d93706bd828a0e7edf0828798b93cf47642be48914b83f27a746d519da14585ddd062b04fb5306222d799f15b6cf5c95f56478bec3b99984afd3b17c1c5bfc8fb83153883bcbf43b12b8", 0xac}, {&(0x7f0000001640)="0117b9f214a3f83a69b360e49735d8edf6cc5df1482abd773469ecde68ba17caceb47dad2bd854b851d7f3cc93c74dddc81b2d8dc2142d68822789c21c04c1dfa5713884db71ddace27064fe92ec3791d59ae771c62cb1440dbf1dc02d3e4469cfcee8679fd127b0da2cbeea6da4e9b4018424a1ef060b8457361ff48156008c351626c5cf4e1454b867f7e6d68196b8f98387c5ee738d2643d4074119463c7c04d44f5fe1dcf429d83ddb7e2f1779ce99cb615dbcbfb380d5a51f428f37542febdce33cfaf3ecceda5c818230b1", 0xce}, {&(0x7f0000001740)="e985e12d0b019aba7ede44d58efebc2cfdbbcfdefdd9a74ffa49dbdf241da63a0c2bce5762601b72fb90a9b4ebe2e2a486698a8541c6ae7caf6eeba4ceccae2a15e665e800caf6cf5f3bc13dfcbf9f44c067120244557fe94d15025385318743988d2631176120ee1200ca6da7a6634817bc25ca1570f22fbdc5c99287adc784818268b7fd0d3face374afc8b1cf70eb1354c1c9285639c486353061f14ffc24b4443804cc8e461f410aa86c20da3910a464f40a5a95ac1e1cc514645b85e250378c14325e71d0b29b78e58722", 0xcd}, {&(0x7f0000001840)="bc0b3bd2258e49750591421ebaf7e829ff9b5c35282f158f40cbbed0775622b65c16096fe525865d587f9ae53c214f727619faff06403dfaf10d0c1366b1c6c0c578a905099273e42fc7d7ae509c2d3dda1a55f31433edbe5349cade57b0b50b54eb303a3b515e97e029d99b9fc8d2828c5fa19042", 0x75}, {&(0x7f00000018c0)="fa8f77141d5a607e7279114971148235f707819656d6d4f8a19d6d3e073fa9850c7a8ea2693b00e4d98df19ff0db1bba73c2d37beac30160d8cfee7852503be76bcf7ea5ca55aedf3e73970caf3777f20dc70be5a19ec53d49059dec87a08ba3b0649deb78bb1eb1a16170115884df1d130d9d70bafea2553e32260838c317d3a7dfe119263a2a5488bb6886100a5441169a0bd1beb4876b5c2dd16783699b0892c6bf806324c6b711663b2d5cd809414e2b3863b92c57a7dafd050f", 0xbc}], 0x5, &(0x7f0000001a00)={0x50, 0x119, 0x7f, "e848135bf9a5f1d8e38eaa1eab49478a671c922fd548eb71e11eebcda0018c39fc32e73d0b2a9ad278e2582549816cb2a7f0eebc2603b722b911ef"}, 0x50, 0x4008840}, {&(0x7f0000001a80)={0x27, 0x1, 0x0, 0x7, 0x68, 0x3f, "164b1c76bf5dcc6887c962542f3e01ccea5556744c72787fc3c5a35c97d6a507d62ece0507a540e285a45c07e2420689d8b8b3b8221c00ffb63ec893877379", 0x10}, 0x60, &(0x7f0000001c80)=[{&(0x7f0000001b00)="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", 0xfd}, {&(0x7f0000001c00)="84638e33e7b4f1596508187d1f8900dd508bb3125ea417173cbe75ccfd1f6dfd229d0b41c4ffc0ab035b666be9a05e0a7e9a4961de86dbaea06cef11ebdd6c5cc38c9bc00b59e9665257df497b2f32d74123bbfb307964abd895a11ba1495a347e510e25242f29a9", 0x68}], 0x2, &(0x7f0000001cc0)={0xb8, 0x105, 0xfb, "98aff4c1dd8b0807d816cbfd6b3e1a782ebc5c1d8f22b6a49d849cf7923296cc8342edbd89a5da66b0aadcbccf5ffc689dd83a448575f6782acaebe08406dc71a90bd5fa4dc4dd16e83b4ccdaa2f07b5667b1fd7acf8877d9f31d0dccb615a50f935a8e53cdeb4be40ff70a8923bfc4339f5d081cf1efb45e4f438da7c58f03bbac1fb70e04aecf69f7db2bdb1905b7daef91532d329f57f28836790b0a57e032a"}, 0xb8, 0x8011}, {&(0x7f0000001d80)={0x27, 0x0, 0x2, 0x4, 0x0, 0x1f, "19923ffdcaa06ba550b370f4cf3d008ddee8d42e7c6f9f995be02c6e4f6c169095a1ebcd72c5544df293bcc0c8cd0845dbea92e64a4d5b63a80e8c20a89e25", 0x28}, 0x60, &(0x7f0000001e40)=[{&(0x7f0000001e00)}], 0x1, &(0x7f0000001e80)={0xa0, 0x103, 0x7fffffff, "2e84acfd28c4802cb5277edeb9b4d6179788d4f864c1c9657dd4c8a418b6d8ecca79d6b775c7855fe00b014622a9f1ee62c6850d9d499af725605857b39ab35390fc9e2c4745f54be4ac58ef68e72666a61586a1d42bb322f547d45fcffc2fbce1a99d95a3f7cb7c21dc25e76ebec1be37f65a2f1cb82b947df4445f5c8b4d9e2136614828c633dee6a3bc40"}, 0xa0, 0x4000}, {&(0x7f0000001f40)={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "7660e8615be68643ea7f1cf5575e71e741d041393794edbe225bbd7cfa027e7534acb8278be792526c6091de5dd30fcd449b969541b0b9450307190abaf1ff", 0x1b}, 0x60, &(0x7f0000003180)=[{&(0x7f0000001fc0)="af366c6e2e0010737762dfd999d6bb605ced21e4bfb0a61ad356745ad07861f2bc534972e6ee95a77ee660e09fc982f163b7aebcabbd0079bbf507ff34f9f53add500a0887b570531db47443bd69f72d803b24da788b1767ef45acf18c01cc57c0635da48aaf8b931f0ea4547126350b74887528fea8edcae8fbe1bc829fd42032a6fcc7e7334ae47064360983d41bc0683224f4278e2fe0d9642575c53524c7b2e61db6e60c62502af12cda7ba8755b5ec8252e8693df79e2f4d1871469b9ae9f937413c86c36245afd932e107cc3120384850803f0ea6c81f86ba8343540008cd8ce52a0e62b4d1142ddca2025f3e86565a6", 0xf3}, {&(0x7f00000020c0)="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", 0x1000}, {&(0x7f00000030c0)="f7c41ef7f1c38a7c203e7c2008d4", 0xe}, {&(0x7f0000003100)="c5566d7f66811d6a1d580b88806e9c8bd671d61a7e9af8ba5346a1340642efc32d15899219b77d18959e73914902a545be4abace3ed5168988eb36a60338ab3e8bcd1a17c3bc", 0x46}], 0x4, &(0x7f00000031c0)={0x78, 0x117, 0x7, "c35725a9d502911eeb66a94f28fbf846637a3146857a038cadd11969feb19f263b052aa5f0791396bc4b2c750839bb478b9c161c3fdd620ae4abbee481f57c81b42218133384203162c7c541422a5993f8fbf80229d2d3389672a7bdaeb8c85d58261f8cec"}, 0x78}, {&(0x7f0000003240)={0x27, 0x1, 0x1, 0x1, 0x5, 0x81, "bcff6f6ea7dc64dc5091a875afd59cab702d9b049e05ef45a141a8da013ca7e34d9766f2032b9d27900ec34b20f127b6c4ec6c3750f4f80cf458fdb1dc4c23", 0xf}, 0x60, &(0x7f0000003400)=[{&(0x7f00000032c0)="70e7b27598aaca91cf1df226b12d1cad0ae788516443ed44a8ed9c91b5c0910e7058aa3bd399aa45af5448d18300b8540d4c2f6a4fc0", 0x36}, {&(0x7f0000003300)="46aa21653917719e5ccac8bb1e766ee557f75a0c5669ec7766380cf1d920185c30cac7b15e4bb60888106caf1c627c154c59a25c24b07eb9e3daa850175a06f01d55071c66dd6c9bbbc386f71909f95a2628992e470a1dbdb66cba1588b2e0e763634d6075151aee09ade5bd7c741078d53c2361bbd617bebaa434b280c93804c190ffa9605b777516f2e8587f9debe001aebcc4b7ec4d9d16fa312e66a732a41d3a16a8a26abc3db47b9c4362b062899884ba6c4c69d6eb6d1524111a064ccc8222cd51e7f5d1c643c32bc486a9e735ee649c1b2917e2be23e083b76cad45b12f2cd82276bc2abb02aca649560777c0c92c19b1bd", 0xf5}], 0x2, &(0x7f0000003440)={0xb8, 0x109, 0x3f, "dd0c8126f09922a140693e7266af99f1c2993f5a606289e0514d372eebfdec96cd9e9f6b91bc2582c6bf17f52ee5b9b6fd576284624614de87c7e01f9e4c798f77d0372e82dccf3f6ba83d03dbf3ae74f382102d9597b30ae9724b507ed429b4460060731c6e5592f51ab358d16077fa09aca18a2328c4f5705a939150563847080c79bb99b43725e8d499dc6c89e1c26270269dbaa07085e153779f14b2d4e653"}, 0xb8, 0x20040010}, {&(0x7f0000003500)={0x27, 0x1, 0x0, 0x2, 0x20, 0x7, "80861956ddcbc9796bbbbf586ef97d2e279a484a50341c1ec4b76404bd3e538996ed6d69c4f4c94142cb592586a844b76d3f6d63b30e6aadd1647ed7cce646", 0x31}, 0x60, &(0x7f0000003840)=[{&(0x7f0000003580)="228b1cde074bdd249ec4e94baa53190d89c6b304bfe3cb776e778e65d2dc0d82e878310c9074e71dfd902f25457ab1471fff42163249861413ad0bf4af89605f6e285fe030a7762e350ab0ecd8da547a476c163310889b2728595563aa1333947412d2d7a9dda9f8946cb88b329e735c883c43db89f9c291fe2940ddc2587d26689feb4dd1c63c4b032e5d541b606810f4e13c356c9782eea822857af3baea4f02c82eefbf4171b1f75b8a8cedac36a6ea7434745cbba83a111cbf461ce468fc7561076c661a049a8f8066b959d5539f28e3d5593e6685", 0xd7}, {&(0x7f0000003680)="8881f519805982b539f97706ee7f6116aa19b7c63baaba5fbdb90cef86805f52a3a22ac29bf8aacc33f4f8f2240a4c623bc58ed323968f8e3862903678b64614801307acffbf56e0ce2bc5890fe4292c0d68cb89f90e2b3b785d6faae688fa0a115615df9c5287883eb57ce2e277d6aded6555111340b1bc608dcc2e930dfbd4aa1b7e94ffd74006830b61f542522480bbd9c5f127111c3bf2f175f557386f64a3e60d0f6eb3c7307946b77ca7368481396d72590b8810daea3bcba6eff192", 0xbf}, {&(0x7f0000003740)="708ab6fa060f949406cc0e7cf854c40f9d1c7edfbf5d5cbf3f157ab8b904d54625a1e35b8fbf0d11e0e59d6a9d82435c00bd54edddc8d8a78118efebedc6df10b5afb4ab297d680a78dfae32d63dc439bd605ecc1361fca52e049c8e32d5459cab29ff2f16f5b7b7d1475842e42ef871183edf7c632b524c4ad5bded83b71efa1dfdcda0c4b62881ace06b94d40bcce517c4eb5348edce3b948a7dd8256cf8668e51323dc6987ae5c123b85136cc6e902ee2c5e2dc954b4274e9131b9cb97d9da768e935ccce9a68d8a95232d1e420546f", 0xd1}], 0x3, &(0x7f0000003880)={0x58, 0x6, 0x94f7, "83665d1354c99f89e861bf578db30a46ac8f3e90bbe48f75e9f7d2b97ab070bb1be242d525fb43f067abc504fd671c42a41da2f437d54db86f22d1b1f2f19234059ce80d0e24718f"}, 0x58, 0x4004004}], 0x7, 0x14) dup(r0) r3 = socket$inet6(0xa, 0xa, 0xffffffff) r4 = dup(r3) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x361400, 0x0) accept$ax25(r5, &(0x7f0000000100)={{0x3, @default}, [@remote, @rose, @rose, @rose, @netrom, @rose, @rose]}, &(0x7f00000001c0)=0x48) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r4, 0x8983, &(0x7f0000000040)={0x0, 'macvlan0\x00', {0x4}, 0x5}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xd, 0x0, &(0x7f0000000000), 0x0, 0x0) timerfd_create(0x6, 0x80000) 01:48:35 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 919.633182] audit: type=1804 audit(1592790515.476:1916): pid=14806 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir775661663/syzkaller.NNiA7V/2104/bus" dev="sda1" ino=16150 res=1 01:48:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x100, 0x70bd29, 0x20, {{}, {}, {0x8, 0x11, 0x49f}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}}, 0x80) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000200)={0xcc}, 0x1) r4 = socket$inet6(0xa, 0x5, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f0000000240)={{0x9, 0x7fff}, 0x27}, 0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6, &(0x7f0000000400)=[{&(0x7f0000010000)="58460bc109ef1753420000100000000001000010000000000000000000000000000805000000000000000048b6ad26c597eb4f5c1900000000000200040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000004700035ab424020004000004000000000000000000d733", 0x7c, 0xfffffffffffffffd}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f0000000280)="9c553e83f6a4fe69a04d9d2debc21f47245e23e55264c5fc6860b3584aaeda7bb3f1602eab775809aec4ef542ef206aed3c8da3d7af3901b2886fbb3c8101de1693d7cbae09114950873a7803392474206d68f01b1d8f3d29b37d502faef5cc6067b39a605943beb0d9fde6270efedda96cbc92105b1e8167fdad6e575e8abd1a180109d11662d5cd90507254a00a1282457b77ce8045c186e4f6a45da44ee849c8ce50647a274f691f0c43e1c7d3f32a594af1ca2d55558654968e6ecc29cb0", 0xc0, 0x5a}, {&(0x7f00000001c0)="571dd34afa1351a5dc46a36c00722b007e61a6576f821724c4ce5f40822980a993b0ba5919414974aa90e2164686991fb303bbf87f629d756af37be6723e4bdeb4e3723a15a0306f99c2dae789de41aae075b776d806f444e4df33db3060d4cf361475dc530abe94d994d847f3719bbfce64d35483b9ab23270e9cfbaa44cfb6015922edcad9bc1e2fed", 0x8a, 0x3}, {&(0x7f00000004c0)="112a4e46afefc4122e373b75e8be09fb4e95cbbf1635a5b1535b540facb2c675883efaa8f4574b04d08f46e631d91247ab455c3ee21fd6f06b45edd4ee67f8db56c1001390266889b3efcbb252b17193ea66e881fd6d71edcf753cd78d4545bfb9b5260f9a749e87aa79690a0516a31eef3a60ef676f0695ce352f861c6e223a1ad2a23d2faddd08e03513ea68e4481db07d8c27082ab1cc38e9d953595e4b863086737f68d561a29bdca4e37db99b291c6593e1c3d1eec927fd76a0d30a4997", 0xc0, 0x8}, {&(0x7f0000000340)="5b72af10cbaec15b73c805a99e991486b6889f1a195795b5a2afdf3a97970b34d7590fb5e9db3e3ac87533de0bb28ba5c4e7fce890cf575b03866b1edd8b76125db3e4b4e42606eaa8eefded6d8ed44de8f7809c0071511fbc539944a63bc92706dfffd2ad195a76b5c9b6310057c81f26424b83d702595f0dfa7456791f4c5c53ab4bd70269f6da9f5b8953485596fcf88b64c8bf85eee94795e455", 0x9c, 0x4798}], 0x0, 0x0) 01:48:35 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "11ceb2cbb7430575", "39f9c8b725bcc65fd21dec9f931e39d8", "e58d72e6", "eb8d85bc81e31d4f"}, 0x28) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 920.112613] audit: type=1800 audit(1592790515.957:1917): pid=14819 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16155 res=0 01:48:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 920.203322] audit: type=1800 audit(1592790516.047:1918): pid=14832 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16160 res=0 01:48:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) ptrace$cont(0x9, r0, 0x9, 0x8001) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe707b94f8f2f4ba64494ce0617478c011ed9311dbe4cc8c47ef1106a63a95560a91df013d286b0b50d2bffd595aed8d07d3d8a8e12a5d7a98c66f2d361002ee893ab5ab2829d6eb7418982aacdda92997917696a84d33de63d6d7dc128b7cf6f41f109cd185608cfeb74c8e4bec38b97e57c8f473718e19c9f9122d26f92404d4ab28696106c360dcd45b73ecb3a4aa4fc1b4fb86d9b24063d73c22e6cd8925110f411ab2d0c90fe0d0acec3b3230e76b8b21b04fdb998c3e2a4e98fa23967c9d0cea5c6a1c1ae6c50f68c5734f8a47ef052eaf70b545a9fca5cb40de179d3c9def89ce2007992e115e4db15489ba8b0"], &(0x7f0000000080)=0x2c) sendmsg$IPSET_CMD_TYPE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x4c, 0xd, 0x6, 0x3, 0x0, 0x0, {0x5, 0x0, 0x4}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 920.389331] audit: type=1800 audit(1592790516.237:1919): pid=14844 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16165 res=0 01:48:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) fcntl$notify(r0, 0x402, 0x10) clone(0x4106080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x3330}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x0) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 920.511935] audit: type=1800 audit(1592790516.357:1920): pid=14850 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16165 res=0 01:48:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x0) fallocate(r0, 0x100000003, 0x804003, 0x28120001) 01:48:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 920.645920] audit: type=1800 audit(1592790516.487:1921): pid=14857 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16165 res=0 01:48:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x3a, @multicast2, 0x4e20, 0x0, 'sed\x00', 0x0, 0x80000001, 0x2e}, 0x2c) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="5846534200001000000000003365ea58fdfacf22c44141000010000000000000000000000000000000000034fb8fb9e4bf48b6ac26c597eb4f5c19000000004fc0adea0000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x87, 0xfffc}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x0) fallocate(r0, 0x100000003, 0x804003, 0x28120001) [ 920.806231] IPVS: set_ctl: invalid protocol: 58 224.0.0.2:20000 [ 920.815161] audit: type=1800 audit(1592790516.657:1922): pid=14869 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16723 res=0 01:48:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(0xffffffffffffffff, 0x100000003, 0x804003, 0x28120001) [ 920.876082] IPVS: set_ctl: invalid protocol: 58 224.0.0.2:20000 01:48:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x54, r2, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip_vti0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @remote}}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008850}, 0x40004) [ 920.987560] audit: type=1800 audit(1592790516.827:1923): pid=14875 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16107 res=0 01:48:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(0xffffffffffffffff, 0x100000003, 0x804003, 0x28120001) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(0xffffffffffffffff, 0x100000003, 0x804003, 0x28120001) 01:48:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) prctl$PR_GET_SECUREBITS(0x1b) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "e563cfe7"}, &(0x7f0000000080)=0x28) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x28) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f0000001640)=""/116) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x7f9fd0c1, 0x3, 0x4, 0x40, 0x3ff, {r1, r2/1000+60000}, {0x4, 0xc, 0x0, 0x8, 0x6, 0x81, "d7d2454d"}, 0x10001, 0x4, @planes=&(0x7f0000001600)={0x2, 0x7, @fd=r4, 0x40}, 0x7ffb}) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000001580)) r7 = socket$inet6(0xa, 0x2, 0x0) dup(r7) readv(r7, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/117, 0x75}, {&(0x7f0000000240)=""/219, 0xdb}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/10, 0xa}, {&(0x7f00000013c0)=""/175, 0xaf}, {&(0x7f0000001480)=""/121, 0x79}], 0x7) connect$inet6(r7, &(0x7f00000015c0)={0xa, 0x4e20, 0x4, @mcast1, 0x9}, 0x1c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100), 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001700)={0x0, 0x7}, 0x8) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x0, 0x804003, 0x28120001) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x0, 0x804003, 0x28120001) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x0, 0x804003, 0x28120001) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x0, 0x28120001) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x0, 0x28120001) 01:48:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x108000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x88, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @ETHTOOL_A_LINKINFO_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x88}}, 0x80) r7 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000200)={r8, 0x5, &(0x7f0000000040)=[0xcb, 0x1, 0x7fffffff, 0x9, 0x400], &(0x7f0000000100)=[0x81, 0x8, 0x8, 0x1, 0x24b], 0x1, 0x6, 0x7, &(0x7f0000000140)=[0xcb6, 0x4, 0x9, 0x3, 0x3f8000, 0xffffff00], &(0x7f00000001c0)=[0x8000, 0x4, 0x6b, 0x0]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x0, 0x28120001) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x0) [ 921.768725] XFS (loop5): SB sanity check failed [ 921.777919] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 921.807519] XFS (loop5): Unmount and run xfs_repair [ 921.820414] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 921.835805] ffff888084e60000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 921.856813] ffff888084e60010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 921.877097] ffff888084e60020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 921.898329] ffff888084e60030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 921.907532] XFS (loop5): SB validate failed with error -117. 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x0) 01:48:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)={'filter\x00', 0x5d, "a560cea3cd71831dcac0db821f3064b622f581ca891692e690c18c417df0fb1e786f07fb7e65419dbbe88a4a58e80c2ef09f6edc29f84c79293c29fc4848893f8c13e1ce20ec74887a9e1d20a46daccacbb473476e88c8f23838960e74"}, &(0x7f0000000080)=0x81) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x5) exit_group(0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000300)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000100)={@private1, r4}, 0x14) 01:48:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000040)='./bus\x00', 0x80011c7042, 0x0) ftruncate(r1, 0x2007fff) fallocate(r0, 0x100000003, 0x804003, 0x0) 01:48:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) [ 922.236325] XFS (loop5): SB sanity check failed [ 922.252400] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f00000002c0)=""/201) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f00000001c0)="0400534200001000000100000000105914b5b30000000000000000000000eb0034fb8fb9e4b648b6ad26c597eb4f5c19000000000000040000000000000d880000000040000def95ec22a265b24423196cea76f7c084fa89890000000052d60d8a00feff010000100000000001000000000000035ab42404000000000000000000ec00000c0080020000000000000000000000008b927afd335fe77e463ee916f569350d3e0a1cc04bb0128c80acc1b32ed322be787b4dac0871eb29e809e18be6aad72ff9d09da82c25b3272b9e27b66062ce87d64f3045", 0xd8}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 922.299833] XFS (loop5): Unmount and run xfs_repair [ 922.304894] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 922.320175] ffff888097666000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 922.353010] ffff888097666010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 922.379146] ffff888097666020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 922.388025] ffff888097666030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:48:38 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x7fffefff) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) 01:48:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$netlink(0x10, 0x3, 0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 922.448694] XFS (loop5): SB validate failed with error -117. 01:48:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x5) 01:48:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=@newqdisc={0x58, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8, 0x1, 'qfq\x00'}]}, 0x2c}}, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 922.738122] XFS (loop5): SB sanity check failed [ 922.743882] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 922.758470] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 01:48:38 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001d80)=[{{&(0x7f00000004c0)=@tipc, 0x80, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000080)=""/28, 0x1c}, {&(0x7f0000000640)=""/97, 0x61}, {&(0x7f00000006c0)=""/78, 0x4e}], 0x4, &(0x7f00000003c0)=""/15, 0xf}, 0x8c80}, {{&(0x7f0000000940)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000009c0)=""/95, 0x5f}, {&(0x7f0000000a40)=""/124, 0x7c}], 0x2, &(0x7f0000000ac0)=""/175, 0xaf}, 0xffffffff}, {{&(0x7f0000000b80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000c00)=""/251, 0xfb}], 0x1}, 0x4}, {{&(0x7f0000000d00)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d80)=""/253, 0xfd}], 0x1, &(0x7f0000000ec0)=""/172, 0xac}, 0x45}, {{&(0x7f0000000f80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, 0x0, 0x0, &(0x7f0000001100)=""/160, 0xa0}, 0x2}, {{&(0x7f00000011c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001240)=""/4, 0x4}, {&(0x7f0000001280)}, {&(0x7f0000001500)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=""/36, 0x24}, 0xff}, {{&(0x7f0000001680)=@ax25={{0x3, @bcast}, [@default, @bcast, @bcast, @bcast, @default, @netrom, @rose, @rose]}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001700)=""/183, 0xb7}, {&(0x7f00000017c0)=""/9, 0x9}, {0x0}, {&(0x7f0000001840)=""/47, 0x2f}, {&(0x7f0000001880)=""/223, 0xdf}, {&(0x7f0000001980)=""/187, 0xbb}, {&(0x7f0000001a40)=""/8, 0x8}, {&(0x7f0000001a80)=""/150, 0x96}, {&(0x7f0000001b40)=""/160, 0xa0}], 0x9, &(0x7f0000001d00)=""/91, 0x5b}, 0x8000}], 0x7, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1000}, 0x0, 0x12000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x5}) syz_genetlink_get_family_id$nl80211(&(0x7f0000003240)='nl80211\x00') sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cdf7ff7304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5db497ceaf3e1b11a5d63a2b7035dc69fa701f3b46fe701880800a7d38dccd4b3e8014aa15c96968359533ce2c5ffdd5f0d3297018bd7c025150940cdead92eb1e6bc6ba45eecf067b32425b6000b2f376ef9172426ae7fa97e5a84ef4dc540bbf5dd458ffcb75724135bd32fa04db6d6a75aedda7ab6e8501fc94e209dc3b2525ae24c954255d3247ca9c1b9525ce68179a52a87333aa2b0a8c1baa6ba6160c6d2018e67bac5402d0d89c5f798b8d1a87b0dc3306f546c61724530d9f4b6f0ee68677c7b261de5afa02d708a8ec97974ba453bc253e2435207f25494a594d4e5be39902358d362cb318ad965b7e7480a5ca5b6fe74e101c400c77392ee4419ad788f494230487811046f21f0f9665dfbaa9e94ed305a02e3fa47039e67dde19f89c8f1741aad752cdfe458ddf54e8fc10ff79b500000000000000", 0x1b9}], 0x3) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 922.791701] XFS (loop5): Unmount and run xfs_repair [ 922.797243] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 922.832886] ffff888063118000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 922.868415] ffff888063118010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 922.877319] ffff888063118020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bind$nfc_llcp(r1, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x6, 0x9, 0xe1, "fd1a26b3261290c3f616114e0f32a10047e8de024eb2d131115d4b431399fbed6aeaf0474e19fc7c189604efadd1a2a298f78a143dda81fb68f828e7f085fc", 0x21}, 0x60) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 922.918263] ffff888063118030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 922.938398] XFS (loop5): SB validate failed with error -117. 01:48:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000050e50000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x464, 0x103, 0x70bd28, 0x25dfdbfe, "ea65a51d3dc6e6defe20c91002a9f13fe9c2061107951e0b159669439a83cd8c", ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) 01:48:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000100)={0x0, 0xd3, 0x200, r3, 0x0, &(0x7f0000000040)={0xd78fed, 0x4, [], @string=&(0x7f0000000000)=0x7}}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000140)={r6, 0x6, 0x3, "38ed866417"}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$vim2m_VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000400)={0x1, @vbi={0x7, 0x9bc, 0x7, 0x35323645, [0x5], [0x81, 0x3f], 0x1}}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x8a6, 0x1, &(0x7f0000000000)=[{&(0x7f0000000280)="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", 0x147, 0x400}], 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r5, r7, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@loopback, 0x4e23, 0x72, 0x4e21, 0xab, 0xa, 0x80, 0x1a0, 0x62, r4, r7}, {0x6, 0x1, 0x9, 0x0, 0xb20c, 0x6, 0xff, 0x2800000000000}, {0x40, 0xe9, 0x5, 0x8}, 0xffff, 0x6e6bb6, 0x0, 0x0, 0x1, 0x3}, {{@in6=@remote, 0x4d3, 0xff}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3501, 0x2, 0x2, 0xa7, 0x0, 0x4, 0x8}}, 0xe8) connect$rose(0xffffffffffffffff, &(0x7f0000000040)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) [ 923.396614] XFS (loop5): SB sanity check failed [ 923.401673] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 923.439984] XFS (loop5): Unmount and run xfs_repair 01:48:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r2, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x204b2af6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xb3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20048000}, 0x0) exit_group(0x0) [ 923.461771] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 923.494007] ffff88821b748000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 923.553263] ffff88821b748010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 923.596903] ffff88821b748020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000140)=0x1c, 0x140000) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x28) ioctl$SNDCTL_DSP_STEREO(r1, 0xc0045003, &(0x7f0000000040)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 923.647861] ffff88821b748030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 923.690683] XFS (loop5): SB validate failed with error -117. 01:48:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x3fffffc, 0x0, &(0x7f0000000040), 0x0, 0x0) 01:48:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r5}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1f, 0x1}}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44000}, 0x820) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 923.880276] lo: Invalid MTU -1824034338 requested, hw min 0 01:48:39 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000002000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x351b295}}, 0x50) [ 923.922458] XFS (loop5): Invalid superblock magic number 01:48:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:39 executing program 1: pipe2$9p(0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8a0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, 0x0}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x0, 0x80000000, 0xffffffff}, 0x14) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) socket$pptp(0x18, 0x1, 0x2) [ 924.055470] XFS (loop5): Invalid superblock magic number 01:48:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregs(0xd, r2, 0x8fc, &(0x7f0000000100)="ecd3d95ea0361eb95cd911853f8d0ec99b81d171ed916bb59f0db1d5d8ab0bcb072037d2dd8806fbf4c75cc0484d68718900768b7b3237") syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/pid_for_children\x00') 01:48:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f00000001c0)={"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"}) exit_group(0x2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x4}], 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', 0x200040, 0x0) accept$netrom(r0, &(0x7f0000000600)={{0x3, @null}, [@remote, @rose, @bcast, @null, @default, @remote, @netrom, @default]}, &(0x7f0000000680)=0x48) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000740)=0x8) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000006c0)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x4, 0x8208, 0x1, 0x1, r3}, &(0x7f0000000100)=0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)={0x1, 'ip6tnl0\x00', {}, 0x8000}) 01:48:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3dffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a, 0x5}], 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000300)={0x0, 0x2, 0x4, {0xb, @win={{0x269b, 0x81, 0x8001, 0x8}, 0x4, 0xed06, &(0x7f0000000280)={{0x3, 0x3997, 0x2, 0x8001}, &(0x7f0000000240)={{0x6, 0x4, 0x7, 0x7ff}, &(0x7f0000000200)={{0x2, 0x3, 0x8, 0x387c5a5d}}}}, 0x1, &(0x7f00000002c0)="be3b2a352bee6230741174a80d7488dd614513ed26667b4b64f1629a7426e511820ba17f2f80a3b122db1a901c", 0x1}}, 0xfff}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) dup(r5) r6 = fcntl$getown(r2, 0x9) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvram\x00', 0x599a80, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r7, 0x5201) sched_getparam(r6, &(0x7f0000000100)) 01:48:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e22, 0x10000, @dev={0xfe, 0x80, [], 0x43}, 0x40}}, 0x4620, 0x2}, &(0x7f0000000040)=0x90) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 924.501372] XFS (loop5): Invalid superblock magic number [ 924.624490] XFS (loop5): Invalid superblock magic number 01:48:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x7, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000280)="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", 0x1000, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, r0, 0x3, 0xcce, r1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000000)=[{&(0x7f00000001c0)="5846ff7f0000000000000000000010000900005400000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a00400001000010000000015ab4243548c9d6334e5b6ef802750004000004000000000000000000ec00000c090a0200000000000048a0", 0x86}, {0x0, 0x0, 0x5c6fc6e3}], 0x12010, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000b40)={0x1c, r5, 0x301, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x2c, r5, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xb1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x6440) 01:48:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') exit_group(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) getpgrp(r0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x21, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:40 executing program 1: pipe2$9p(0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8a0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, 0x0}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x0, 0x80000000, 0xffffffff}, 0x14) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) socket$pptp(0x18, 0x1, 0x2) 01:48:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x750, 0x15, 0x20, 0x70bd27, 0x25dfdbfd, {0x2b, 0x7}, [@INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "c0dc94b079dd6503991d6717d85a1af6304dd446df9d03889a719fe59566e0f9cff6e111928482f98f075c7b27603156b3887cce32bf9ceeb6c705a2672da7755d5063f899d202ccc9bc6ec0f08edf635804b99c2a8d3c30c333b71ef98e1061e313eaa8a98019e0c193f5a052070a50c5b1dfc03344487ef42e9045fa42c2290ff444c3167ba0ac975324bbb92f2eaa789f768579315c643b679e1b96d81552e9e2802b1dce4e0b04d12e8e376f15f3fc34dddb09e3246a221853386c5350be5fe5173f68fa54c21951332d9d4930abddd92e3a339af1db"}, @INET_DIAG_REQ_BYTECODE={0xb8, 0x1, "f2322bdf19222cadaf0f95eb4acdab0cb7696e6f8e6af7acc43689a1ba9103f42f3829d7a91fc15237d0f33354e621311887d476ed8afb85b99ed28b1ea799fc047c68cf0bbf541dfcced25e52f94d206c768597775fbaddc08e1126e9c02ddf872d9deff07373c9b9463ad5dced6d7b07c62f0afb366260e7afd2ecd7e2c89312d37fd449fc021f6983e9349f811fbdc2d29b6177b997e859ad8125bd3ff5aa089e0916d7c1887b00f362a32c69cc3315acad2d"}, @INET_DIAG_REQ_BYTECODE={0x76, 0x1, "cf2efdaa0fb8e2e52d052476467b23fa1646b5a7134cdfd839114d2c34ab184a2a467e2909e8af219d6d5147a41d74439234c3c2e9c6494cb8e1bc224cd0a0b5ef05b222a7ddd3b818a78fd09818a41a6a6bcbb88b6eaa1d20e3e466b944ebb9cf4fe627948032dfdb552f0e0529be4559b2"}, @INET_DIAG_REQ_BYTECODE={0x56, 0x1, "c64d1aa05f97c0013ff397e9c573f3fd0bf79c70cbedb6eb364115d4a658c9bb1c9cde2dea834cb657f038773d6dff8e82e1ca89c071fe32932b377743e8d5c81418644593ab0617aa7b4b1094cb53c8a2c3"}, @INET_DIAG_REQ_BYTECODE={0x84, 0x1, "cc3a03b03de2894220531b299905a703f5891a34e800b791c87d730a3e19e1e8b4dea1e5a02701bb2685e50a802469b7ba6745949673a973fc1125739f5412582f3deeed38ee1c3be9e7a14f0482ace72ecd64af3624adc2ec23baf6ac4e8cd9dd20e7d130133874d27c2e848bed9b6872237abd04acef5941fca5d29dec7c38"}, @INET_DIAG_REQ_BYTECODE={0xda, 0x1, "884b588e2c0802f57ce08208866291a1c194ffa00e02350750f08bfede1e97a9732e14b93138f12a93e05eadebcf2c9e6bc538de8c839ab359d95273203532f51fd1d73a31cf0abdc9ad34c72e1c89998af49b35be0bdb9992e2a2a2bde383f5d76efe104cc13685a888d44dbc3a6c7320fea0bd372598cb7bfa4bfe616c42ad53273e904eb7facc65370cebe29dac415ef2122b126f4696d47a624782675455763c2940dc2de7fea8f30e9e9fcec427559fab17f859d43a6ba38c9655b20f9e3ad97ef74787d38703e5440720b6804bc29c1033e3a3"}, @INET_DIAG_REQ_BYTECODE={0xd1, 0x1, "4f846cf8f7492463dc52de05fc0dff9b60dc7b39b1418baa3db6ff8ce0fe0c9f8d47f119589d871acaf7182c5f4b6605bed02435bbb5507c04738425ef932638b09aae7079faa64dcc42ae4e517a360927e70646ca109c6501d656666d2615216fd49576eb24a7f400d8533b6848de0496c81206ae3778660bcae8afd733190080b98b34b6abd7809c7850c753623289c95264b6d5b2c42d1f51eaf4ca013a36270be8d2c5e74cba5e97bc58ccbbede2e726e036ab5f1fda001aa4b1b79b7921c088f576fd7a8ef159fcf3934d"}, @INET_DIAG_REQ_BYTECODE={0xd8, 0x1, "54e3f91df3ca9d9fe6303b1e4516e2b699f069b70f5c8c04da52151ed8a7ea7d6266dd9c396c5b4e3807d01f48b75d980a8ee2ef2b5c7ca91771fb1e36013884248ac0c6986e1a6cc0edb1eca08000037df4d8c771b4bedb68439b65513324ba9a8c55afac8d6a4c2a858e8955f3f7bf4071a49df2cc09f5300c1e618ae7e6bf5c33661d614378913a282f9b1dda58fb3fbb9c8dcae98dc4f2cfe0498fde738185d02c214cc79ec5d073715c9f70e99e9a5206c5a56e0dbf65905a3ca062115a4cc8b64be682d27fa0b7de6011a761fbd7e5e96c"}, @INET_DIAG_REQ_BYTECODE={0xd9, 0x1, "28af250554aa5397fec5d83df84a15321e2f0e181a1cff07829950aa0bd76d5eec63a73e4922806a98b04dfd34968576efce297e43b6abc2e10a6ab40022476e0489db808256d7989027ef35f45780d49d138045ea98d18aa56debf16727b46f14bc01e5649ff7fca00e029ba3137d91d343a09e568dfb60b300a3c6551814b3fc508b6f4527591c9fefc0ca88f8460cd032bb0342c2f5730b4df73461f14f0fca95aa0b744281dd81d780963c76fcc528ebb00e54dfb6a658caf9b3227e8d4727cafbf95691ac804746cb81e919a4f0db7fd7d6d0"}, @INET_DIAG_REQ_BYTECODE={0xef, 0x1, "43dfcb241cda771a70951e5a50a383ca18f232aff8b692ed3a1182d4466f0318293120d11bede787f8ada7c5e8814e6dccbc77e9a4ea491efa9bca95783ef3c6b09033b35e1123c5d62a21cb3680e8a51a93bbafa178ede361c97dd82b42194dc54dfbe9e7a978987be2f98b5e860f29bb9ff5ec49a83bb0e668541bbfe54b8586f24d233cc280fba725214330a9806d069518df50e8367c8adada9c728b9267ff8e3660a9fd6d026172ab71f47ea6ca41653b4950d241666e26df18c2d3af4c4ccf634b5c2ba9daa681a529d21045b9528299f9202e124d07a47ed063ccad34fd3f53e8f8e45fede99378"}]}, 0x750}}, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 925.234212] XFS (loop5): SB sanity check failed [ 925.243526] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 925.275149] XFS (loop5): Unmount and run xfs_repair [ 925.293158] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 925.312696] ffff8880955db000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 925.336545] ffff8880955db010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 925.356813] ffff8880955db020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 925.376554] ffff8880955db030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 925.395781] XFS (loop5): SB validate failed with error -117. 01:48:41 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syslog(0x4, &(0x7f0000000000)=""/86, 0x56) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 925.674728] XFS (loop5): SB sanity check failed [ 925.679602] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 925.716940] XFS (loop5): Unmount and run xfs_repair [ 925.722111] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 925.729063] ffff88803dd6c000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 925.737926] ffff88803dd6c010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 925.757224] ffff88803dd6c020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 925.774180] ffff88803dd6c030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 925.794714] XFS (loop5): SB validate failed with error -117. 01:48:41 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000700)={0x0, &(0x7f0000000680)=[&(0x7f00000001c0)="cff4daecb413b6e3cad4ef3c012a076925a4d84fda91f9b4d309f36fbfee741c14e534934612c41aa12425fe7e52ff283a4bcb691c0cc1d2d51e243dd3e043d5b569ba1bd04c50fc70a90313fa50d6cc7d658776900ea95c5d48540a7e8ffd1be169b2bf35c4fd56d174d20efabc415bc737fb4895c224244697ee9fa32f64788828d8e4bd9c0510b9a82e1e3da7625c29dd8603db09c4d318523858bb918952d637866e380983c33ef3dc6883aba69b55bf65a5a8ba", &(0x7f0000000280)="0e3ce5e3799a44f30b684722f0e107ea17c9fa9f129ae968dc9249ca59e6c1bb46e6364a63c6c0fe7c44d3063847e326111897847f60d58821b4130e34677878f5f1110e94d6396dda447a580a54541e8f709326fbb74dff3bff20e1e4889d46c2ce216cf23c2a8c2f678ef1b65cf10c9f538490cf670fec1fc91469acd6dd33fdf00ec49165eb3e85c8613dd067067e46f286084bbe967dd327c43a2995de78750123a454f7276530b1b3868f8cecac0142a4b0f5a7b6b6d82977f3e802a01a23d05c00d8", &(0x7f0000000000)="5dac6279177c478ca829986db6b0f66be3e63869a555dab854b8808052aa69493f1a924a39861a9717a84546e2f9d9c91072d006f256b704e7a89f4776816185eb772b607078ca5a8ef02791219f4aefd33e431416d6", &(0x7f0000000380)="7f0033ba5d56a98ef42c4824d709f2760aa50f8b3185fd572208451e754737aae5dac1918db5cba8bd04978a630505f16f166215e0edc1c55cd43b4100dc3a61f8b28453f17cd6303b51081f4fdcddfdc1ca2656228761f2f4aa6e351c496f67e39e729a78cd2feda8bedabf46d01900a3418624678f30f28426106c2bc17d9a8db773c801", &(0x7f0000000100)="c0dcd7f00c5fb368b2024dacbd1dcb3d808c457f435ff59f7002922512bb9bea6b6f89b802a4c43f214eae0000960021c7c86f3ae95166b0e6fc79b18b665f26ffb785b9a2c583bc68b2d1571f27cfd0b6aba1f396e362ec", &(0x7f0000000440)="43fedb437bd0a7940449272bd6f6a35c88d2489880330dee8594bf62482d9357f59a2772c7b8fcdf1a279068d4a3bca8951687343092cf350cf8ef5b2bcfc53698dd07bc83c65b11c8e2b43b13136885672ce374304d66bf6bce291341d7538ffd59d3f92a0c7ec51c49ebf3045c98c41e3d5a58697a05abefe00b22c4340c2eec172103a5c6fbe3b519425b87ff681ed36f00efe301b6f34237bfc60a11b2d55d5ed56a746cdd3065c04950ee2db3b22b1501ca8a78a2c0608e522282891ff48ad6494d33cc7143a17150ff492301d1f934fedb64", &(0x7f0000000540)="609536a1b54ee5df14eb3f1bc9830599d64068985837ee483847093a", &(0x7f0000000580), &(0x7f00000005c0)="1b3a84df0c06c87e845880843c3b2de042e5a590d21c7cf9b4b36cf3c49096a4634afc33f77bb73d28a645e3ac246acc20678ce09b4908eb060b590021a134f4dfe52055240f52ff5fc74fc2dc09bb269006037115a83072a7172f53cc4d677fe69ce3b35adf06c8b2ceec5caed6383628b7036968752e4749a7376d20959cdcef7072058f522274e6e94d95c22a83f8d3812c6943975f72"]}) 01:48:41 executing program 1: write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8a0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket(0x11, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x38}, 0x1, 0x0, 0x0, 0x20008040}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x4040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) socket$pptp(0x18, 0x1, 0x2) 01:48:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, r2, 0xffff, 0x0, 0x0, 0x4e, 0x0, 0xffd3, 0x81, 0x1000, 0x3, 0x0, 'syz0\x00'}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYRES64=r6, @ANYRES16=r3, @ANYBLOB="100026bd7000fbdbdf2503000000080002000600000005000600010000000500050002000000"], 0x2c}, 0x1, 0x0, 0x0, 0xc840}, 0x404c094) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, r7, 0x0, 0x70bd25, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={[], [], @private=0xa010101}}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:lib_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4048050}, 0x4081) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r7, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:urandom_device_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'dummy0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x4005}, 0x46811) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x9) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x10000000, 0xaaaaaaaaaaaabb0, &(0x7f0000000040), 0x200400, 0x0) [ 926.113342] XFS (loop5): SB sanity check failed [ 926.120588] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 926.168479] XFS (loop5): Unmount and run xfs_repair [ 926.184968] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 926.199801] ffff8880a5429000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 926.218579] ffff8880a5429010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 926.237854] ffff8880a5429020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 926.257733] ffff8880a5429030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 926.277760] XFS (loop5): SB validate failed with error -117. [ 926.446972] XFS (loop5): SB sanity check failed [ 926.452157] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f0000000000)={&(0x7f0000000100)="ab803286596f78d66c471286f9b2b6a7b8d385b0121caeb1bd8e08139c82f93de866c40bc0fdf6db5a43fd20837348d65ce4b8eb137a69a239d3409d3d22324746b165ff", 0x44, 0x2}) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x50d022, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000200)={0x7, 0x4b, 0x1}, 0x7) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) [ 926.488247] XFS (loop5): Unmount and run xfs_repair [ 926.506309] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 926.524700] ffff888050423000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 926.553753] ffff888050423010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 926.578016] ffff888050423020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 926.604165] ffff888050423030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 926.634604] XFS (loop5): SB validate failed with error -117. 01:48:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8120, 0x0) 01:48:42 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000040)=0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r4}}]}) chown(&(0x7f0000000000)='./file0\x00', r2, r4) 01:48:42 executing program 1: 01:48:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000000000134fb8fb9e4bf48b6ad26c597eb4f5c1900f7ff00000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x6d, 0x800000000000000}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000108fcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="0200000000080000080004005fed4c41f1f460d64a8f7f80afc606c5ed2920eace0eed56c89167dcb076c77b3fcf31ad543a66b4c11ec720a21630e5", @ANYRES32=r2, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@deltfilter={0x34, 0x2d, 0x420, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r2, {0x2, 0x2}, {0x8, 0x4}, {0xd, 0xfff2}}, [@TCA_RATE={0x6, 0x5, {0xff, 0x1f}}, @TCA_CHAIN={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0xc0) [ 927.054974] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 01:48:42 executing program 1: 01:48:42 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x60480, 0x1) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000001c0)=""/166) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0xc0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000240)=0xc7, &(0x7f0000000280)=0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/ldiscs\x00', 0x0, 0x0) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="20000000050601030000000000e2b72526100000000073797aff6b473c0003df8ef1d7673873aa9374ddc68a00000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x48001}, 0x8080) [ 927.144107] XFS (loop5): SB sanity check failed [ 927.149151] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 927.203137] XFS (loop5): Unmount and run xfs_repair [ 927.219638] XFS (loop5): First 64 bytes of corrupted metadata buffer: 01:48:43 executing program 1: [ 927.243446] ffff88805c7d3000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 927.280302] ffff88805c7d3010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01:48:43 executing program 1: [ 927.314773] ffff88805c7d3020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 927.354691] ffff88805c7d3030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:48:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000040)='rxrpc_s\x00', 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SIOCAX25CTLCON(r4, 0x89e8, &(0x7f00000001c0)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x5, 0x8000, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) 01:48:43 executing program 1: 01:48:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)='XFSB', 0x4}], 0x2209400, 0x0) 01:48:43 executing program 1: [ 927.428341] XFS (loop5): SB validate failed with error -117. [ 927.590420] XFS (loop5): SB sanity check failed [ 927.595336] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff [ 927.653921] XFS (loop5): Unmount and run xfs_repair [ 927.684141] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 927.713109] ffff888016102000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 927.756790] ffff888016102010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 927.800205] ffff888016102020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 927.829163] ffff888016102030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 927.848756] XFS (loop5): SB validate failed with error -117. 01:48:43 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x0, &(0x7f00000000c0), 0x0, 0x0) 01:48:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = semget(0x1, 0x0, 0x104) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f00000001c0)=""/198) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000040)=0x5) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:43 executing program 1: 01:48:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x3a, &(0x7f00000000c0)=[{&(0x7f0000000000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000100)={0x1, 0x100, 0x7, {0x401, 0x3c4, 0xfffffff8, 0x405e}}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000140)={0x3, 'batadv_slave_1\x00', {0x40}, 0x7ff}) r4 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$nfc_llcp(r4, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x3, 0x5f, 0x7, "ba49ab530f0e9fe652a148c9793ff77335d282ab9c6e5b21cfefdbab8888ff5643998e4689319db3da926c57949703186c30663d6494a54fb4585e51400d59", 0x6}, 0x60) bind$rds(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x31}}, 0x10) 01:48:43 executing program 1: 01:48:43 executing program 1: [ 928.101308] XFS (loop5): Invalid superblock magic number 01:48:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r5}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)={'batadv0\x00', r5}) setsockopt$inet_mreqn(r1, 0x0, 0x3, &(0x7f0000000200)={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, r6}, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = dup(r7) getsockopt$IP6T_SO_GET_ENTRIES(r8, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c6465720000000034dd18df0000000000000000000000004a78d162ba49a0d34cd800000000000004000000a563cfe7c15e7abd008b6ff109c4708eca8c90edf0cf5ebaf57343876b03a46f93b309daba989d2cc9eb6a0297b5a21814837861d2863319031f01ffe522e54193b2d7dba0719b7422738b5728c148a861c18899ba581d2015e62ee5412a7a984762f7fc26aa7357aa685f8f19c68180d154fd5e48717516918d1d7a890ebdb3bbca2e175bd42ad98cf2882c9d499616a10754184503032b318e5a7e36b6a609ef"], &(0x7f0000000080)=0x2c) ioctl$KVM_SET_ONE_REG(r8, 0x4010aeac, &(0x7f0000000040)={0x1, 0x8}) 01:48:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$SNDCTL_DSP_GETCAPS(r2, 0x8004500f, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KIOCSOUND(r1, 0x4b2f, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:44 executing program 1: 01:48:44 executing program 1: 01:48:44 executing program 0: exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x317db83a9744fe5d) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 928.378613] XFS (loop5): SB sanity check failed [ 928.388303] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:44 executing program 1: [ 928.431999] XFS (loop5): Unmount and run xfs_repair 01:48:44 executing program 1: 01:48:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETXF(r0, 0x5434, &(0x7f00000000c0)={0x8, 0x0, [0x78e9, 0x2, 0x0, 0x101, 0x3e10], 0x100}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 928.452607] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 928.471944] ffff88805a233000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:48:44 executing program 1: 01:48:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="93b2000000000000000001"], 0x38}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r3, 0x800, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x1c, 0x18, {0x10000, @bearer=@l2={'eth', 0x3a, 'bond_slave_1\x00'}}}}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0xa814}, 0x4806) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x0, &(0x7f00000000c0), 0x8000, 0x0) [ 928.528372] ffff88805a233010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 928.572813] ffff88805a233020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. 01:48:44 executing program 1: 01:48:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 928.624628] ffff88805a233030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ 01:48:44 executing program 1: [ 928.680137] XFS (loop5): SB validate failed with error -117. 01:48:44 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe7920ae17626aa394f1b39fcc4fb7288f7d812df434a2bbfde248a6cc4249f3b9889567c75c81de70c4c52cd8eeb4c95abd8ea8b4bd40f296a5866d275d98f07f6e7874b91a5b469fcf01bef861b14ee4748e5b19d928cff132f9b93d97c30bed33eb7c9cf8b0f2f3d0ef767aaa9d9b1145d9dbb10376334985614000000c7e33698ad676ce600"/184], &(0x7f0000000080)=0x2c) recvfrom$rxrpc(r1, &(0x7f00000001c0)=""/216, 0xd8, 0x80002020, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @remote}}, 0x24) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:44 executing program 1: 01:48:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0xfeff, @none, 0x8000, 0x1}, 0xe) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000080)={0x1, 0x0, 0x200e, 0x40000, 0x1, 0x4aa7ef86, 0x5, 0x1}) 01:48:44 executing program 1: 01:48:44 executing program 1: 01:48:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5}], 0x0, 0x0) 01:48:44 executing program 1: [ 929.018686] XFS (loop5): SB sanity check failed [ 929.023571] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x2fd/0x380, xfs_sb block 0xffffffffffffffff 01:48:44 executing program 1: [ 929.072526] XFS (loop5): Unmount and run xfs_repair 01:48:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:45 executing program 1: [ 929.115393] XFS (loop5): First 64 bytes of corrupted metadata buffer: [ 929.145109] ffff8880973d8000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 01:48:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TIOCCBRK(r1, 0x5428) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) [ 929.197573] ffff8880973d8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 929.243805] ffff8880973d8020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 929.283604] ffff8880973d8030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 929.316686] XFS (loop5): SB validate failed with error -117. 01:48:45 executing program 5: clone(0x20002227ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = accept4(r0, &(0x7f0000000000)=@alg, &(0x7f0000000100)=0x80, 0x80000) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x15, 0xa, 0x801, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xd}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x200401c6) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x200200, 0x0) ioctl$TIOCCBRK(r4, 0x5428) 01:48:45 executing program 1: 01:48:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYRESDEC], &(0x7f0000000080)=0x2c) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x40000000000}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x2) 01:48:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000000)={0xffffffff, "a1a6b65817c79bdeb7d94e4b175718b73338b7c92f8a8d3e210abe4977fbc17d", 0x3, 0xfffffffa, 0x4, 0x50007, 0xca3b8a9a8506329f, 0x2}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, 0x1, 0x2, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_CLASS={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 01:48:45 executing program 1: 01:48:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$unix(r1, &(0x7f0000000640)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000200)="9d6137b3eb1387bfe53c7a82ac661f46bcb8fe799cf326ab777505b31ef2887aa9da97af18896b04964dd27f2a954825dd4a42ba3a0d21b6505438dc338c2cc09e2450ddaec4f17442826cfe6e940c188b0a17e3d097d25b0c4198135e53042d6f20e9b8da", 0x65}, {&(0x7f0000000280)="32c51866c88b7264adf591cf98e770dd9c3915eab6fda66904d0c89e5711de99a7fe2343e8791b1280a7fc2f2c6d48504ecb7fe202d8be0c377ba85a1d4ac56bec8dba5eaa10f582e3daed2558543ac51560702070b0c098f2a8cf0cbb6119844e721eb6284c76c8c6a2854b6420bfda756832d0a9465d07f71a041b4b4f94cb166d05943c995b4d43948605473cef505515910b4c4d289f9e568306e1eb13a0cbfa91332563222b4636c5a496219494db973011baa5ac2b0bd184f07aa75f5d34dfc425d792aed06880080340ce163e1a8149cec9ca91e053344d0183146341", 0xe0}, {&(0x7f0000000380)="9a60fcdf10c9091bfcdabe9291da5133a96edc37c43eac7f6893b8d4d54de8ea1cf901e6b54915a80f90e581dead790da817dda0340b06ff8256f8be7321971fac829d73d97a1198f5bee56e4b40d86d15ad420c381dd8d7887a0b3912b0f9f4b5a8e03dae5e4ae20672cd650ad88ab4ccf4938ba572d5099ef05c2bb2cd8914e64a80073adb0cad427bb0171420c3ad05e52bfd713cfc1d9e44784aca71ec59a7edd0d1943587d383b3", 0xaa}, {&(0x7f0000000440)="420e825ca18bb337e36280bdded8d0df3a1c96e70c6599d3e5df9f946b32abfecc7e2a8fe2fbdfa2a3fd886b6d177dbac1614681101e81c48f8db0d13a108bfb39609bc4628fb12b0f7042390a54456ddf46147e566c2b3e6babc9a93cc09b6ca56ed6c6a55a617d7200bd070f627d78cd55d4e0108e22f37d3c261c5bba634b4b529c090f827c8f8fe0c5c099fcea182c7ff8383e60027d7f4dc03a9078ae0ec759745239af5d12fdcbee47bab05ab1ceadd7dcaaba5b984235bca8204d674554480c5309ac0eadcf4803bdccdaad97d0f0f07c5766f8399b04a4a285603ac7ece274cbe4f1", 0xe6}, {&(0x7f0000000000)="a4aa05535a4abe124407", 0xa}, {&(0x7f0000000540)}, {&(0x7f0000000580)="392b490b8cc99895f0cf5b7facdd090fdde2f1ce79454574fc", 0x19}], 0x7, 0x0, 0x0, 0x40}, 0x4000000) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffb, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="61466b4214327522d04e16e2932d74076ffee0a3784fac7ac3aaa3273ea958a58f516ca18cc88627e95b8f8bc181a6903e210a2511c0f2022a6bbf8a45f1af9a629b293bbcdd52e6b6e18ebde3e0877b583464229e105c5678891221", 0x5c, 0x41}], 0x208029, 0x0) 01:48:45 executing program 4: getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r0}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r4, 0x10, &(0x7f0000000340)={&(0x7f0000000240)=""/203, 0xcb, 0x0}}, 0x10) socket$inet6(0xa, 0x2, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="629bf0ff04000000851000f40700000018000000040000000000000008000000850000000900000062905000f0ffffff07280100fcffffff"], &(0x7f0000000100)='GPL\x00', 0x40000, 0x7, &(0x7f0000000140)=""/7, 0x41100, 0x1, [], r0, 0xd, r2, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0xd, 0xfffffff7, 0x2}, 0x10, r5, r6}, 0x78) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2200800, 0x0) ptrace$setregs(0xd, 0xffffffffffffffff, 0x3, &(0x7f0000000080)="40d3b681c32dd537230d0ada862a7616c3b9bbcfb2d4db107a91b891ee1f9ede393339cda4d31343d74096f471aed5d60ef6282c5b695874dd41eed9b31599f4e45d8f6496dbe963e13fd7e7ede6cc92") r7 = shmget$private(0x0, 0x4000, 0x100, &(0x7f0000ffc000/0x4000)=nil) shmat(r7, &(0x7f0000ffe000/0x2000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(r7, 0x0) shmctl$SHM_STAT_ANY(r7, 0xf, 0xfffffffffffffffe) 01:48:45 executing program 1: 01:48:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) connect$phonet_pipe(r1, &(0x7f0000000040)={0x23, 0x7, 0x9f, 0x3}, 0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:45 executing program 1: 01:48:45 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000)='NLBL_CIPSOv4\x00') exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000001, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x40080, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000dc0)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000e00)={0x8, 'batadv_slave_1\x00', {'wg0\x00'}, 0x101}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000e40)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000002000000000000000000000004000000a563cfe71a648283c9b7b46a052b653758f95f185ad1d421141abd3aaf598d453fe2067dd163130931abcc9d37ed179585daf2d8c2b51c77c9b0b3f7737e1c1d479d66a7ad5e13a1d6b0358b2ddf8672b089ee2ffa24b283f1861ce46a7ed75caa2c7ccb8c7cd7be54434c2ecd2ef304eccd72179296399ea1613927952b60ce5ee9b3ddcc596d250452ec2ddfbf8331ba6a1283e6296e74529fb28d2d2c6b6e732b92bb524959cc3c2241154df85f54ad93de7b1d17b2d39ab263e923e94a1271e059c3ce7cafa2d5"], &(0x7f0000000080)=0x2c) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000d40)='trusted.overlay.origin\x00', &(0x7f0000000d80)='y\x00', 0x2, 0x2) r4 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r5 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x4, 0x0) write(r5, &(0x7f0000000c80)="87fbf1af82a97b58100673a0b43af1d93f392880b26f156a451d54ecd1d5e4e3b614a5beab5ad1aaf1e057970fe2e5f6f5924c566b3eb3fe4bbc592b1d9779dc88b92341cb3f73cf5969e3518b99f7ef5eccc8f2332bf411c22e7d8a92003e7ae60be717e191e209fd29e4c580993059142f518c592ab27b96089192693656625e0aa43d4ee43b9218f4c0850a78ca36c2fcf6ecad36770ba5e503676a052bfcb25796fe1d04906b85508cc4579a", 0xae) write$binfmt_elf64(r4, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x6, 0x2, 0x9, 0x80000004, 0x3, 0x6, 0x7, 0x95, 0x40, 0x6b, 0x3, 0x1000, 0x38, 0x2, 0x9, 0x400, 0x1}, [{0x4, 0x200, 0xfffffffffffffffe, 0x70d329ad, 0x80, 0x3, 0x0, 0x301}, {0x70000000, 0x4, 0x3, 0x22, 0x400000000000002, 0x80000001, 0x4, 0x3e87}], "43bd699e22eb1c133a4dc9dc4e15bb6fa5d1aec93418b8f07defc120c3c575a1f742d9659632396a0caeddecafdfaecd0976c0b2af5c009521b67bff3d9b6d8df5ff8825d17abd5c72fc3ad7970f7014d257f2bcb5258425597a788752375a9046bd5c221fb2af564e702823150d5357171a823ba75378d4ed4a5461110786305f84584c6221fa26f0e247e2da9021ac4c196938c585b02f31af42560c11020b9e7239fb38cce075d549025735110299f108ffc7bcff2a2e48590fe6e6d6619e162b141405d3b9f14fbd1dd5c25871d172faea7c9cb78c1dd51b469cd09bc1057f32f09d1cc30a357e", [[], [], [], [], [], [], [], [], []]}, 0xa99) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) read$midi(r7, &(0x7f0000000f40)=""/205, 0xcd) 01:48:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sched_getattr(0x0, &(0x7f00000000c0)={0x38}, 0x38, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@loopback, r4}, 0x14) 01:48:45 executing program 1: 01:48:45 executing program 1: 01:48:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r5, 0x309}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x8c, r5, 0x4, 0x70bd27, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x841}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './file0', [{0x20, 'xfs\x00'}, {0x20, '-:\x96}'}, {0x20, '\\/\\]*\''}, {0x20, '3}).-'}, {0x20, 'xfs\x00'}, {0x20, '&'}, {0x20, 'filter\x00'}, {0x20, 'xfs\x00'}, {0x20, '#x\\'}], 0xa, "77a8fd3e3f259c3e641ad61d649468c16851ab8c515683ffaf213ddfd9d32882e5869a3d34347b173d9ca0462d133f3e48667bdedb2c5e2e4d1c3e3ff34cc6ff64346437a1465e8b9019afa86b75688fca2dce06e6d06999"}, 0x92) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) openat(r7, &(0x7f0000000140)='./file0\x00', 0x20000, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xac, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xff80}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1cf}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4f22}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x81}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0xa}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010101}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x800}, 0x4) [ 929.832586] XFS (loop4): Invalid superblock magic number 01:48:45 executing program 1: 01:48:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x402b, 0x40) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x20, 0x1, 0x204, 0x3, 0x1000, 0xcaeb, 0x5, 0x2, r3}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e21, @remote}}}, &(0x7f0000000280)=0x84) r5 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a5634fe7"], &(0x7f0000000080)=0x2c) ioctl$SOUND_MIXER_READ_VOLUME(r5, 0x80044d12, &(0x7f0000000040)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x19) 01:48:45 executing program 1: [ 929.958151] XFS (loop4): Invalid superblock magic number 01:48:45 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x2e, &(0x7f0000000400)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x84) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fdatasync(r2) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41cc, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x3}, 0x456a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x100002, r2}) 01:48:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000b40)={0x1c, r3, 0x301, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, r3, 0x8d80e99adb2c00fb, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000140)={0x9f, 0xd44a}) 01:48:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = msgget(0x3, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000040)}) msgsnd(r1, &(0x7f00000002c0)={0x3, "6d23da160853f3550b2f4c7346e67817e597e9f39abb1401647a84bd8fdf6bd888a0f9e6bff14f48ad256a6d4b984ab0a619b01a6c3f20e1f150016ea7562e7385851fb6c4476f84f1a848c589568d1b064f796a32c6486029140e94d16bdfa807f72fbffa933fc74f0a5833aa5f8fc549c7090e5fd2e5f74dc4af5cf848898cb0bfd944ac33bd18f0"}, 0x91, 0x800) r4 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="66696c7465920000000000000000000036af7004030000a563cfe7318fe802000000d2a2a323df1697e5166af9e1901e381005130f03f6bf3be878e653c92a912e687f23352effbb192ce7cbe4f89f22"], &(0x7f0000000080)=0x2c) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000001c0)={0xa, 0x0, [{0xa000000a, 0x7, 0x40000000, 0x51ea, 0x7fff}, {0xc0000001, 0x40, 0x0, 0x80000001, 0x8000}, {0xb, 0x6, 0x409, 0x1000000, 0x10000}, {0x80000019, 0x10001, 0x2, 0x10000, 0xd55}, {0xc0000000, 0x40, 0x4, 0x8bc6, 0x9}, {0x7, 0x7fffffff, 0x9, 0x9, 0x7}, {0x0, 0xf5a, 0xfe6, 0x5, 0xfffffffb}, {0x4, 0x8, 0x90, 0x8, 0x9}, {0x2, 0x2, 0x9, 0x7ff, 0x1}, {0x80000008, 0x8, 0x22, 0x101, 0xffff7fff}]}) 01:48:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000013afb22c26677f7b00000004000000a563cfe7"], &(0x7f0000000080)=0x2c) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x80010, r3, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000001d000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) prctl$PR_SET_FPEMU(0xa, 0x1) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r4, r5/1000+10000}}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendmsg$NFT_MSG_GETSET(r7, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0xa, 0xa, 0x801, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2e}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x84}, 0x40049) 01:48:46 executing program 0: clone(0x88801000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000003c0)={{0x3f}, 'port1\x00', 0x82, 0x20810, 0x1, 0xffff, 0x10001, 0x81, 0x55, 0x0, 0x2, 0x1}) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x1d8, 0x14, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x1f}, [@INET_DIAG_REQ_BYTECODE={0x84, 0x1, "21977792a1346c51e1ab515d9c4e9bd9fb3100504a018bffed7a0ea1e04c2af29d88ca4fcf78979c21906964db90f01ff6c7e2a9b670325197214e5b3bf47a8b6ccc13711f9d3768b903e154dac3a791f1c21ede1d646a1e8b2478db6334b49d4f2080767b9720ce00815b60564fd97f630b82a964bab87eb8ba32c8735b72cd"}, @INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "b14aee02c4bf9673031be49c861f4511db30d7a54dec657daa242f69682f46776344289251bab6fe9940543dc9f8e06aa7ac51d8b68ee33a2ddfa593358b3807587b044dc084b20e15024f9e9da130526014dc9f9bf9141319c399dad45812ceed893a0858f90d208f13e17d68e16abe46bebedb2ad325b3e33efafc9e0de7fdec0c692ed5a27d2ec719deecc1466cc81744f36dc62c000268944e918b"}, @INET_DIAG_REQ_BYTECODE={0x9c, 0x1, "34010bdefb78e2bee7f561d92e861bf4ce61fb813d1af2e8e2788456b5a41c1561186a0f1442f5bf01e5070122b4e781e305f0371b671ebb34c466a270f31bbe2678e22f3c8bd3e6dd3eee7d24ac577aee8cc594d0e61fb82e05bc1821e2166274f8c74a35e24bf39f8bddfb2bf525a41583904411f8bef901a79eda49b945cc995e82f679942b2fbda1f47f6f0939c38070a19f1e6f572b"}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x8080}, 0x20008000) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000004c0)=&(0x7f0000000480)) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:46 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000000)={0x3}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) 01:48:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x4002, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x80800, 0x0) accept4$tipc(r3, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x800) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x18, &(0x7f0000000280)=0x4, 0x4) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="f4860000dd90adabbf214e75f2859a660c27ad1e6c0b6b793628a4db539c917708eff683627f9b562bb001717312d69044f004206aec67e754e3766a92b6d0eae658e02c1144c2bfa27cf57e0eae5a32cce17299b3256137e8bb3438de3e777675e7", @ANYRES16=r7, @ANYBLOB="00042abd7000fcdbdf250000000008000800000000000800020001000000"], 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x2010871) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0x1b, "63b6ba5b820400ff28e730d4158328c0fd93e0d15635f8c77cc4ff"}, &(0x7f0000000080)=0x3f) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CURSOR2(r8, 0xc02464bb, &(0x7f00000001c0)={0x3, 0x5, 0x5, 0xffff0000, 0x80000001, 0x8, 0x7, 0xde, 0x8}) name_to_handle_at(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="7200000008000000f0c2af31d89c6d3ad347a2e76364f2980d0100e60065d809240fc2ed1324e8b686fd37a0d3d18456fade71b23df160a15a9de52419b5e572b1fe72a736cb05a739c451260f73d8607fbc0a3506f99ce1454530"], &(0x7f0000000100), 0x1400) 01:48:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000300000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) readv(r1, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/100, 0x64}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e24, 0x0, @private0, 0x4}}, [0x0, 0x0, 0x9, 0x2, 0x7, 0x1, 0x9, 0x400, 0x4, 0x7, 0x4, 0xffffffff, 0x7, 0x7, 0x101]}, &(0x7f0000000000)=0x100) 01:48:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x800000000000000, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x100, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x14, 0x0, 0x70bd27, 0x25dfdbfd, {0x29}}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x50) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000000c0)={0xe, {0x1, 0xcd, 0xfd, 0xae, "d5ff4ff292444479c14f7be94a5bc36ba5f616e1bdd36e5dae5c38509694158fa5f73e025228aed87eacdd80ec659dbdef5eb266ec51f081b5e5a773ef4408abecce1831659493541068e0f97e8553be8c2887ba0740171fad264a05e019f6081b017ce37d263faeb375789654db1c1589ac146c70b99bcd8aa77632214412d1838e14fefa98492e5a7a7199dca08ecda589cc7afa399826740d033f9fa2c032c54ff5014927f33c89a3c2da5601"}}, 0xba) 01:48:46 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r5, r7, 0x0) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r8, r10, 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_user='access=user'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@aname={'aname', 0x3d, 'xfs\x00'}}, {@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@subj_type={'subj_type', 0x3d, '\x7f)+(/!@'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_gt={'euid>', r7}}, {@fowner_lt={'fowner<', r10}}, {@measure='measure'}, {@subj_type={'subj_type', 0x3d, '+^):+'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000240)="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", 0xffffffffffffffe1, 0xfffffffffffffffe}, {0x0, 0x0, 0x5c6fc6e3}, {&(0x7f00000000c0)="dba4adde7a9c461bbc2740bb06fbf4bf2b6ba6d2b9e8102dc5ad9c5254c589e78c30d7cc32476a3d8ac6c2cfbe235be146ad563b364c849ca26b1c7f4e859665d906bd4f50aa0d3b9345a04e6b2a1012ea8280ad33a5e379b261452eaeab9916e6c3b1c8ba45340a7a32d9a1994664a8f07a3e8f4518b9d6ead84db253d765d72a8476c0291b9148d3bd271e3ae45bc360472f9f97d97f4385ad6269368b503745ce534f6ee44d78a6cb6ba108282f8eb1445c80d7074e7a8a0f5e3f8a", 0x0, 0xe9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$binfmt_aout(r1, &(0x7f0000000380)={{0x107, 0x52, 0x3, 0x29c, 0x11e, 0x0, 0x2f2}, "ccc83542510f9e769b5cdbe9a821085fc2ccfc0024fc16e0c35f9462ccc847ba08563dc3f44dc62229925586d191114d", [[], []]}, 0x250) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bind$alg(r3, &(0x7f00000001c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) 01:48:46 executing program 4: io_setup(0x8, &(0x7f0000000000)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:47 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 01:48:47 executing program 5: clone(0x200a31449fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) accept4$rose(r1, &(0x7f0000000000)=@full={0xb, @remote, @remote, 0x0, [@remote, @default, @null, @rose, @netrom, @rose]}, &(0x7f0000000040)=0x40, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) fanotify_init(0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000001c0)={'nat\x00', 0x73, "a563cfe78f47b7bf5e6481d806ec19ee9782437b8de039f3b1898a576b6ecfc9947bd96c3ecba07e63f0904fa3410cda3166751a20250bfea1bfcdeaca1a2a2b5a7fc88b0561884611c203a0624946a034ac70974e919cb99767dc1727af115b8ece9e7d31e064fa1abc2cb74da686547fe453"}, &(0x7f0000000080)=0x97) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x1a) 01:48:47 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:48:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d7d000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:47 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x8c, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}, @CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @ipv4={[], [], @broadcast}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x83}}]}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x34}}, {0x8, 0x2, @remote}}}]}]}, 0x8c}}, 0x4008840) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @random="c7cdd50b3fc8", @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}}}}}}, 0x26) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r1, 0xa, 0x0, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @random="c7cdd50b3fc8", @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}}}}}}, 0x26) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x14, r4, 0xc91add0bf88807dd, 0x0, 0x0, {0x5}}, 0x14}}, 0x4000) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa10a350fb13b6f49}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="e001", @ANYBLOB="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"], 0x1e0}, 0x1, 0x0, 0x0, 0x4}, 0x54) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 01:48:47 executing program 5: exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x0, &(0x7f00000000c0), 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x8, &(0x7f0000000680)=[{&(0x7f00000000c0)="ecc8a6bdabc990d90ee021c3992994b8da52daaa73d608a935ba499755554a28d503203685516fa5a316d12af05baff5ef131731c3313d0287923b6b6a94d586081a41b64a18392b77b909a2445d1e51c6f122ab47216b0fc530b5f4a7396415859cf5d6a2c1d39b5afaa183e0ebcb1e7a84228f8d710063e6a9b19751fcf2dcdc312614b51ac2b2568ddc0e50b213c57c3c258d", 0x94, 0x5}, {&(0x7f00000001c0)="0d985a5bafafd6", 0x7, 0xfff}, {&(0x7f0000000200)="096ffb1b07acb4225ce8f7e9ce76bde7b6a3f3c31f2df57df6b32497b7f14f37a9414d5cc0c9a143fff1cdb4c0a92e87aa5251f715bf893dae853c07e4969ccd076bd2a204dccedcacf8ddf7ea9c61bf990d284c92dc8b789694ffef29aed408a04c750903ebe1d5c6ac55037164275f6c6e9b855ff28a31e9b2ba17005667aa784788b753c9c2ec1b008604c0351d51f2548e60fafbe84d1dda29159876f8bf96f5340f0897e07de0b8feb5b7ddab8eeab316512cab446d3129955ac7cf1122efc6e63444468c80246e30e061142022c967061b6e830b072ff75dd4765538508886a035d1ff4e9b406f777e44583392635dda", 0xf3, 0x3ff}, {&(0x7f0000000300)="0147e2ef87bb0367f52d6421d1076545b8cab4bee0b019dc549f9537f81c5f433c1ed0844ab2c3a9cbf666d5ed99f89e7a92a7", 0x33, 0x6d1bf68c}, {&(0x7f0000000340)="f006b14be7e7a99504094fc2f68cb15153c747786a25a139719bdaf68c2ddfb4e9e0ff8ab585c15419cf8037dc0265c11b414415eafbb15f4135bd27928cf0a50d8c3568096542d759bd7d310239d6bb9756ee274606403819879dc2db58a8317602009510daa8a6f668d7a3bb979b417fe8c1b81ab9ab67b9c8fbd13e9d29aa49d8c497fe6f281447cf2c7f85eee008313e908218a87744100e0a4867c30676ded68377e64a132516fc0a829a3dcb61345f5c0990a3bb1d5b273eeb4105e659a9a3f6fe62d6d6c07c2c465b9ce804486705f931fdd797c0", 0xd8}, {&(0x7f0000000440)="92db009fb26b389fcc7c3857d9c124c5691cc32ae5cf68d546a5a086fd1c7b8a085cabf4086eb5fa8931ffcc64a8ff88c15921b9ba53f48003f0b4b926c2e1b498e96b32646b73959c5578478e19e915d79eb756bc726b29b41839fc76b5d2b58959d332944c943cffbc02fe5e6a927ebd59ce3663f0b4b894cf6f7c066eb1bf12c37bed8af44e7213da1e646b9e88508529609e6255a9e7d1f38844631c522b9b31a89696c0ba052170bcb4dca705497eadbb3cecf66adec399a7c1b6b16fa19b1f3195", 0xc4, 0x10001}, {&(0x7f0000000540)="3583c38d7a9e0ba1c8d89fa28611f7f3cfb717f576ccd655c82798ef2c63bf1e6921bde40f6080a18d4c89ec11a9d78ac8ce1199a22ed40a53ec9d7df5645f791347a9f4733c15bfd5359fa5e7ebbb63e1f11c223e9219623558ee767c76a0d5995deb0286a003289ad113d5089a790921cefa7ff55a689caadab0836be6e21d4793e919dea235e7224c24ae79aa18dcc61205751adad52741bc1eec5ee32f634ca26bae28d465d93e23b1764ee4856f563d6a6ec30a1a1d4b9949bc9e1e317393200212da0af457af9687e3ae", 0xcd, 0x6}, {&(0x7f0000000640)="6628eb53e716fd01a074c02165811447dc75be8191721a47562de4466997aa570be22445523942378016d8c4f0872b38f10d59dcfe6cc909879a", 0x3a, 0x2}], 0x80004, &(0x7f0000000740)={[{@datasum='datasum'}, {@thread_pool={'thread_pool', 0x3d, 0x6}}, {@nodiscard='nodiscard'}], [{@subj_role={'subj_role', 0x3d, 'xfs\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@fowner_lt={'fowner<', r2}}]}) 01:48:47 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @empty=0xfdffffff}, @l2tp={0x2, 0x0, @dev}, @nl=@unspec, 0xfd, 0x0, 0x0, 0x0, 0x2e04}) 01:48:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="54a031807108e4734dffc3f87fa18d12e593e5840e7e8a325131670e343f56ab9ceeb24de9fc4652be2500cc446a26df0718ad211653e3011e645bed409f9be8aad9c11eb1da3325c911f8c4df5cee288fb08033f49237ceae5b42b6c296d02614747e1dc865a09f675e645284ad19671a830b459bfe07450f478096ffd3b9d7d70b7e07b9e602e30ee7b66ef118010fc3376cbd3d3f7f294ae196da5b491c0cfb9dc4b92331742c9c61e8d45dc3c08a6a546f68067e0997ce79d96c7c4dc322947279e13b641d71510a30541b23992122998426bc83080ed297a269b0903d4615eb58091b64624a66ce64c496", 0xed, 0x9}, {&(0x7f0000000180)="f9a1250fbe0a60e8c8010183930c13c504a478ee5b23a32a2e19d2e608bc30dce7353a57dd95cec95871b1fe7f9f9d087800122fc3437831d40d3e1240acba89e63975ee5a55e66bb68e0279bc2edcb6213069e6c3dbc34d7e696d05c515772090b3850641ff68699713af7e58355d75dcb827b0f4c2184a147167bc0864fa65cc1e29f0018151ef95b4ea6cac8c0b1076baff", 0x93, 0x7f}, {&(0x7f0000000240)="2af306daf11dbd98ce7d4ee94db5e7605be62fbf289263c3203f91da299ff7b18162b19b389b7d", 0x27, 0x7}, {&(0x7f0000000280)="773005f992751686b701373a0d5dee8a9d1782374b1d1bdf514433d5a38dfa787394570b62078ac5ca88dd51eb0c4291058d914276da7a119441a586fbd134a2abed51536a1fff70599c7af0727b4f9d65030d86a6cd320fef9fa16a2f6bde40d21165fa232919d6a763e45d78b2eb8524c777c55c6c6d03eaf5a03509b888b55d048e9bea0c643d00a4551945dbde34a467cacc74365b375bf4ae6642eafd5656c2a6f796e9297426d20505f8e80a242595113eb96c", 0xb6}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x1, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000480)) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000500)={0x990000, 0xff, 0xa4c9, r3, 0x0, &(0x7f00000004c0)={0x990a2f, 0x5, [], @ptr=0x1}}) close(r4) dup(r0) pread64(r0, &(0x7f00000003c0)=""/86, 0x56, 0x800000) 01:48:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000100)={0x45, 0x4}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x9, &(0x7f00000000c0)={0x1ff, 0x4}) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:47 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x7ff) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SIOCRSSL2CALL(r4, 0x89e2, &(0x7f0000000100)=@null) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000000c0)=0x3) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x88000, 0x0) 01:48:47 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1260, 0x0) 01:48:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x2, 0x12) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) [ 931.899768] XFS (loop3): Invalid superblock magic number 01:48:47 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) mq_notify(r0, &(0x7f0000000380)) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 01:48:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 01:48:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r3, r5, 0x0) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x40c000, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000200)) r8 = dup(r7) getsockopt$IP6T_SO_GET_ENTRIES(r8, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$PIO_SCRNMAP(r8, 0x4b41, &(0x7f0000000280)="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") r9 = add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="ba0722ba", 0x4, r3) keyctl$instantiate(0xc, r0, &(0x7f0000000040)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '#$', 0x20, 0x93}, 0x2a, r9) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) 01:48:47 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x0, 0x0, 0x2, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x500, 0x0, 0x2, 0x100000000000001}, 0x20) [ 932.050819] XFS (loop3): Invalid superblock magic number 01:48:48 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x0, 0x0, 0x2, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x500, 0x0, 0x2, 0x100000000000001}, 0x20) 01:48:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r1}}]}) setgid(r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_LINK={0x8, 0x1, r6}, @GTPA_VERSION={0x8}, @GTPA_FLOW={0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) syncfs(r1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = dup3(0xffffffffffffffff, r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000001c0)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00042fa6f12e000000000c00147379783000"/34], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x41) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:48 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x0, 0x0, 0x2, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x500, 0x0, 0x2, 0x100000000000001}, 0x20) 01:48:48 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x0, 0x0, 0x2, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x500, 0x0, 0x2, 0x100000000000001}, 0x20) 01:48:48 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f00000001c0)=""/185, 0x6d5}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x81}], 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x400002, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000100)=0x6a9) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x402b40, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x28) read$eventfd(r2, &(0x7f0000000140), 0x8) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572001400000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$VIDIOC_DBG_S_REGISTER(r5, 0x4038564f, &(0x7f0000000040)={{0x0, @addr=0x7fff}, 0x8, 0x10000, 0x9}) [ 932.409232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15974 comm=syz-executor.3 01:48:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0xff) r1 = dup(r0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40000, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600602fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd00000000", 0x6b, 0x4000002, 0x0, 0x0) 01:48:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000280)={r6, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0x3b, 0x3a, 0x11, 0x2, 0x7, 0x3, 0x4, 0x6e}) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000100)={0x9, 0x26, "e8aefa61db6d536e40d42f2c475a62e463eeb2a46f29d511e28a9b406f0ac73d81a58edfc700"}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:48 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) readv(r2, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x4) dup3(r1, r2, 0x0) 01:48:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000000)=0x7) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) [ 932.701929] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15974 comm=syz-executor.3 [ 932.809874] [ 932.811588] ====================================================== [ 932.817984] WARNING: possible circular locking dependency detected [ 932.824299] 4.14.184-syzkaller #0 Not tainted [ 932.828780] ------------------------------------------------------ [ 932.835090] syz-executor.1/16050 is trying to acquire lock: [ 932.840790] (&event->child_mutex){+.+.}, at: [] perf_read+0x2a1/0x7c0 [ 932.849044] [ 932.849044] but task is already holding lock: [ 932.855007] (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x14d/0x2c0 [ 932.864201] [ 932.864201] which lock already depends on the new lock. [ 932.864201] [ 932.872628] [ 932.872628] the existing dependency chain (in reverse order) is: [ 932.880238] [ 932.880238] -> #5 (&cpuctx_mutex){+.+.}: [ 932.885793] __mutex_lock+0xe8/0x1430 [ 932.890112] perf_event_init_cpu+0xb7/0x170 [ 932.894953] perf_event_init+0x2cc/0x308 [ 932.899530] start_kernel+0x46b/0x771 [ 932.903850] secondary_startup_64+0xa5/0xb0 [ 932.908684] [ 932.908684] -> #4 (pmus_lock){+.+.}: [ 932.913887] __mutex_lock+0xe8/0x1430 [ 932.918204] perf_event_init_cpu+0x2c/0x170 [ 932.923043] cpuhp_invoke_callback+0x1e6/0x1a90 [ 932.928234] _cpu_up+0x21a/0x520 [ 932.932119] do_cpu_up+0x9a/0x160 [ 932.936087] smp_init+0x197/0x1ac [ 932.940055] kernel_init_freeable+0x3f4/0x615 [ 932.945064] kernel_init+0xd/0x15b [ 932.959177] ret_from_fork+0x24/0x30 [ 932.963404] [ 932.963404] -> #3 (cpu_hotplug_lock.rw_sem){++++}: [ 932.969823] cpus_read_lock+0x39/0xc0 [ 932.974143] static_key_slow_inc+0xe/0x20 [ 932.978808] tracepoint_probe_register_prio+0x4dc/0x6d0 [ 932.984689] trace_event_reg+0x272/0x330 [ 932.989267] perf_trace_init+0x424/0xa50 [ 932.993850] perf_tp_event_init+0x79/0xf0 [ 932.998619] perf_try_init_event+0x15b/0x1f0 [ 933.004169] perf_event_alloc.part.0+0xdd4/0x25c0 [ 933.009535] SyS_perf_event_open+0x68c/0x24b0 [ 933.014548] do_syscall_64+0x1d5/0x640 [ 933.018952] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 933.024649] [ 933.024649] -> #2 (tracepoints_mutex){+.+.}: [ 933.030544] __mutex_lock+0xe8/0x1430 [ 933.034866] tracepoint_probe_register_prio+0x36/0x6d0 [ 933.040660] trace_event_reg+0x272/0x330 [ 933.045240] perf_trace_init+0x424/0xa50 [ 933.049828] perf_tp_event_init+0x79/0xf0 [ 933.054499] perf_try_init_event+0x15b/0x1f0 [ 933.059424] perf_event_alloc.part.0+0xdd4/0x25c0 [ 933.064779] SyS_perf_event_open+0x68c/0x24b0 [ 933.069786] do_syscall_64+0x1d5/0x640 [ 933.074186] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 933.079881] [ 933.079881] -> #1 (event_mutex){+.+.}: [ 933.085248] __mutex_lock+0xe8/0x1430 [ 933.089561] perf_trace_destroy+0x23/0xf0 [ 933.094223] _free_event+0x328/0xe50 [ 933.098490] free_event+0x32/0x40 [ 933.102453] perf_event_release_kernel+0x35c/0x870 [ 933.107895] perf_release+0x33/0x40 [ 933.112031] __fput+0x25f/0x7a0 [ 933.115820] task_work_run+0x113/0x190 [ 933.120229] exit_to_usermode_loop+0x1ad/0x200 [ 933.125321] do_syscall_64+0x4a3/0x640 [ 933.129718] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 933.135411] [ 933.135411] -> #0 (&event->child_mutex){+.+.}: [ 933.141473] lock_acquire+0x170/0x3f0 [ 933.145783] __mutex_lock+0xe8/0x1430 [ 933.150095] perf_read+0x2a1/0x7c0 [ 933.154145] do_iter_read+0x3e3/0x5a0 [ 933.158475] vfs_readv+0xd3/0x130 [ 933.162435] do_readv+0xfc/0x2c0 [ 933.166313] do_syscall_64+0x1d5/0x640 [ 933.170715] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 933.176407] [ 933.176407] other info that might help us debug this: [ 933.176407] [ 933.184636] Chain exists of: [ 933.184636] &event->child_mutex --> pmus_lock --> &cpuctx_mutex [ 933.184636] [ 933.195214] Possible unsafe locking scenario: [ 933.195214] [ 933.201261] CPU0 CPU1 [ 933.205913] ---- ---- [ 933.210687] lock(&cpuctx_mutex); [ 933.214224] lock(pmus_lock); [ 933.219929] lock(&cpuctx_mutex); [ 933.225979] lock(&event->child_mutex); [ 933.230061] [ 933.230061] *** DEADLOCK *** [ 933.230061] [ 933.236118] 1 lock held by syz-executor.1/16050: [ 933.240880] #0: (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x14d/0x2c0 [ 933.250530] [ 933.250530] stack backtrace: [ 933.255024] CPU: 0 PID: 16050 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 933.262891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.272238] Call Trace: [ 933.274822] dump_stack+0x1b2/0x283 [ 933.278444] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 933.283885] __lock_acquire+0x3057/0x42a0 [ 933.288025] ? depot_save_stack+0x1dd/0x401 [ 933.292427] ? trace_hardirqs_on+0x10/0x10 [ 933.296650] ? check_preemption_disabled+0x35/0x240 [ 933.301662] ? __kmalloc+0x15a/0x400 [ 933.305370] ? do_iter_read+0x3e3/0x5a0 [ 933.309332] ? vfs_readv+0xd3/0x130 [ 933.312949] ? do_readv+0xfc/0x2c0 [ 933.316481] ? do_syscall_64+0x1d5/0x640 [ 933.320537] lock_acquire+0x170/0x3f0 [ 933.324338] ? perf_read+0x2a1/0x7c0 [ 933.328048] ? perf_read+0x2a1/0x7c0 [ 933.331749] __mutex_lock+0xe8/0x1430 [ 933.335541] ? perf_read+0x2a1/0x7c0 [ 933.339245] ? perf_trace_lock_acquire+0x4b0/0x4b0 [ 933.344167] ? perf_read+0x2a1/0x7c0 [ 933.347873] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 933.353347] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 933.358802] ? rcu_read_lock_sched_held+0x10a/0x130 [ 933.363806] ? __kmalloc+0x3a4/0x400 [ 933.367512] ? perf_read+0x2a1/0x7c0 [ 933.371219] perf_read+0x2a1/0x7c0 [ 933.374757] ? cpu_clock_event_init+0xe0/0xe0 [ 933.379250] ? retint_kernel+0x2d/0x2d [ 933.383248] ? do_iter_read+0x1b1/0x5a0 [ 933.387232] do_iter_read+0x3e3/0x5a0 [ 933.391028] ? __fget+0x1ff/0x360 [ 933.394470] vfs_readv+0xd3/0x130 [ 933.397914] ? compat_rw_copy_check_uvector+0x320/0x320 [ 933.403273] ? lock_release+0x41e/0x7f0 [ 933.407251] ? lock_downgrade+0x6e0/0x6e0 [ 933.411397] ? __fget_light+0x199/0x1f0 [ 933.415363] do_readv+0xfc/0x2c0 [ 933.418718] ? vfs_readv+0x130/0x130 [ 933.422423] ? do_syscall_64+0x4c/0x640 [ 933.426386] ? do_preadv+0x200/0x200 [ 933.430094] do_syscall_64+0x1d5/0x640 [ 933.434085] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 933.439262] RIP: 0033:0x45ca59 [ 933.442533] RSP: 002b:00007f92d3345c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 933.450239] RAX: ffffffffffffffda RBX: 00000000004fbce0 RCX: 000000000045ca59 01:48:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000040)={0x5, {0x101, 0x4, 0x1, 0x20}, {0x81, 0x3ff, 0x3, 0x7}, {0x4, 0x8}}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000c1b038f320a2b5bcd690f0d94386f00"/40], &(0x7f0000000080)=0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000180)) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000200)={0x0, 0x80000, r5}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0xfffffffe, @private0={0xfc, 0x0, [], 0x1}, 0xfff}, {0xa, 0x4e24, 0x8, @mcast1, 0x3}, 0x800, [0x9, 0x1f, 0xd, 0x7, 0x101, 0x7, 0x34, 0x2]}, 0x5c) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000007f000000000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r7, 0x800443d3, &(0x7f0000000000)={@fixed={[], 0x10}, 0x5, 0x9, 0x80}) prctl$PR_GET_NO_NEW_PRIVS(0x27) 01:48:49 executing program 4: socketpair(0xb, 0x800, 0x1, &(0x7f0000000000)) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) [ 933.457495] RDX: 0000000000000004 RSI: 000000002058c000 RDI: 0000000000000005 [ 933.464752] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 933.472010] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 933.479267] R13: 00000000000008a9 R14: 00000000004cb66e R15: 00007f92d33466d4 01:48:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000200)='./file0/file0\x00', 0x3fffffc, 0x6, &(0x7f0000000500)=[{&(0x7f00000000c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}, {&(0x7f00000005c0)="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", 0x111, 0x9}, {&(0x7f0000000000)="cd546e7280a8370fd5710b5014509e5f1ea8e915e416c5a3fd5e6adef02dceb7eee3471f46818eb07f2258de36fcbca86cf7138d12a95e0eab9879c7444bc3391895bcb6d41bb3dddfede37593b8e306debcfb61ba2fc74ab08725dba66da0afe503a2", 0x63, 0x6}, {&(0x7f0000000340)="935042d7dbbe6c0cb062476438cde523c1bcb504306f68152a5d8ddeb9e6f722761e3d154f4d5ff9929e25c8c2fc4c4c3642b3844f493348ea792268f7c66b7b83689be8653c4b177d4f97fbe0d22b2283068efa9cd03d78e30ed1972b60fa4523df9d706505b73e8e452a44452c7d0ef9fb65088551c6c5b2cbd77889857786f512daad32b410e5e5114b806d1f1d9c4a47b3ff57f48437ca709e23ef0e6a8ea27f7eac069023c783", 0xa9, 0x2}, {&(0x7f0000000280)="8e683e09663be9074bbe578d4b822362c6fc5a45909e47ea8a249ae915aa6e0d85225513161ead750ed197261d182be164c97747f5084c26b98711ec9f8101306bc9bd8c9274857cacb60c0d59e1648da25ad95938fbbde86be22449b3b562df80b278ae73aa2829bc84beade8e62c32512146ccb936d97301fe89b66340fc345d4d64783e0d917423f467f1d204c7dabce9c5106e027b12f3f67936e27235b751c6d2732ad1c90f0dc94b23d086585f827fd4ec2c7a3c8f1fa1f1c7", 0xbc, 0x7}, {&(0x7f0000000400)="f6a14373b83fd00ab4b7cec041318b3fe512e6b95055406620db9f0feca9701d77aedb33b53e07582bb482c728b8f62bfd8e68fc55c099e2a0b492e16d4403f2b1c221a5d880b3856ae7968df7e93b7d8fddc071e5cb40a1a2b22bf84ebae271a3f3d3ef19dffb74bcb84582983b5b12111ea5948dd4719eeb958f99d318749fe852451d9dc518a5b9d5b56618f60ec61c973d64b24b64a4f0557827e61c53d9fcb21632baa4134e1c5c40c80b3e8e5d11273aef74ecf69d536a9fbb48e52f0133af2fc9915608dc45b2", 0xca, 0x5}], 0x0, 0x0) getxattr(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)=@random={'system.', 'xfs\x00'}, &(0x7f0000000700)=""/198, 0xc6) 01:48:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = accept(r0, &(0x7f0000000100)=@alg, &(0x7f0000000000)=0x80) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r5}, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r5, 0x6}, 0x8) 01:48:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 01:48:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}, {&(0x7f0000000000)="93a2742fd5affd45841dbb6c96801f115c76f73cfb55831967f47bc7b4f566f5b9349060239660b521e0334cf8f1", 0x2e, 0x80000001}], 0x25, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f00000000c0)=0x10001, 0x4) 01:48:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000040)=[{&(0x7f00000000c0)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c, 0x6}, {0x0, 0x0, 0x7ff}], 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) fadvise64(r0, 0x200, 0x8, 0x5) 01:48:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x502, 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x3f7, 0x10, 0x70bd27, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r4, r2, 0x1e}, 0x10) r5 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe77fb8707101d0e2d667841b131a5e05d3877e3b346ca9365e50877ec045531e358097de7beb4162ac7b4cbb0b2735521655987119560415da065b031eff4d1c03bb6b2c505db51f957d16da01b2ae0dc43a43062960007d914cf4c076e524be343f176e0e3353e937954898158b7f4b2e4967a898094f5367ca5982ba35ff22137262d794b3840bd7f3388e72526da2ac535df889066304ac8f5d68c406848c7a6b7e0a206f432fb09ffc8e2cd213f2a50424fb58687bd291986f0ca3792b97f6f99ed466d09975"], &(0x7f0000000080)=0x2c) r6 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x9}]}) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x20, 0x1, 0x0, 0x5, 0x0, 0x0, 0x11050, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x6, 0x2}, 0x5002, 0x9, 0xff, 0x9, 0x0, 0x7, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xd) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x104, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r7, 0x65, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 01:48:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 01:48:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x1ff, 0x0, 0x0, 0x8c20, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c74657200000000000000000000000004ffff00000000000000e78f000004000000a563cfe7e68ed76532971d414daa5d0e83b774b33c111540dc2f743bfc69960663b242e573526ec7a1e27e8ff42506ab89728415f05a9e386ecebd06000000"], &(0x7f0000000080)=0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) r2 = socket$inet(0x2, 0x1, 0xfffffffc) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={r3, 0x1, 0x3}, 0x8) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r5, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)={{r6, r7/1000+60000}}) 01:48:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffc, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000100)={0x0, 0xffff, 0x300d}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) waitid$P_PIDFD(0x3, r2, 0x0, 0x1000001, &(0x7f0000000140)) r3 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r7 = dup2(r6, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000001080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000340), r8, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x1, @loopback, 0x4}, {0xa, 0x4e23, 0x697, @private1, 0x4}, r8, 0xcad}}, 0x48) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="580000000f1404002cbd7000fddbdf2507004500636d0000080003000000000008000300000000000c00450069625f73727074000c00450072646d615f00000008000100010000000800010000000000d077c5038ff2c1aa5722040fccba51ea96298e51d1383bc75d62278f4b6c45494bc11821ecf612fd4d3484cb4e5af0c594c6b0e7bbc5782c3d77fd029ba6854fc0326f969980d0cf4dcd8f7092877089cae03571d3a21cee6209d0f33c40bdc21bc1242ecd1326af4234467f8c169f0d2abdbca085ec3ebf1b8fca437947eb0b223077b6b6b16700db3291fa1158"], 0x58}, 0x1, 0x0, 0x0, 0x4000084}, 0x8010) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000040)={0x9d0000, 0x4, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9c090c, 0x0, [], @value=0x7}}) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40001000}, 0x4e, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, 0x3, 0x6, 0x3, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x810}, 0x200408c0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 01:48:49 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000004cd6b1f4d6ac4cacf46c99"], &(0x7f0000000080)=0x2c) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0x7) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) 01:48:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='logfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80042, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x1, 0x3}, 0x10) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x1, 0xffffffff, @name="c01a395ca66e3d64ed1fedf142c2d33bcb00"}) socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) accept4$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x800) socket$phonet(0x23, 0x2, 0x1) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000018000000000000000000000004000000a563cfe7"], &(0x7f0000000080)=0x2c) r8 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r8, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getpeername$inet6(r8, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) 01:48:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2008800, 0x0) 01:48:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 01:48:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='wg1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f00000001c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fcee3}, {&(0x7f0000000240)="ea02a40133316871529e0bd3b7dfbc703ae12fb505559a4f1594f43ecd666622bf692dcd8dc264e5a55f59f26de850b9671b4d645e35539dba230414593c2850be6cd37d78a73bd37f9eeac004577205554a0bdac0329c746a35fac30adf8138c1666afdbf7b0ec1594c656d9894a9bdf1e5979cc6c6a0fa422a58b5439800c4886792483b24893b32ae89a4c89308df90c4578077bf79f9d91c2f2dfb95151d7378d57597e641bdbca5", 0xaa, 0xfffffffffffffffc}, {&(0x7f00000000c0)="2276bab73d302e211cef87586028e5c2a1d1766dd835f9be03539f6af84d8fe9046dd507049bcda91ba3771cdca626fd76660e4b7b3424e464c0e3cdaf0b7eaaa6282de9ccceb219f9dfaf6d95c379c79343be3e13b5795bab4eeb3466bb42978c85b0e3", 0x64, 0x8001}], 0x2008400, 0x0) 01:48:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a02", 0x7c}, {0x0, 0x0, 0x5c6fc6e3}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) r2 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r3}, 0x8) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c74080000000000000000000000000004000000a563cfe71e4489be0e6222159b2d3e1adb7486b816a94e4169714149e3915a9b4609826bdee5ac46a1ca6f3699d34f420cb0ec70aa1c6426"], &(0x7f0000000080)=0x2c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000140), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r3, 0x5, 0x20}, 0xc) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000000280)=0x8000, 0x4) 01:48:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) ioprio_get$uid(0x3, r2) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010006000000000000001b00000008009a000200d2"], 0x1c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x44, r3, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xef, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x80) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:50 executing program 5: socket(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x3fffffc, 0x0, &(0x7f00000000c0), 0x0, 0x0) 01:48:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)=ANY=[], 0x14}}, 0x0) close(r0) socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bond0\x00', 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000000540), 0x187, 0x0) 01:48:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:50 executing program 3: sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18080824}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, 0x1, 0x7, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x100000001}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x7f25}]}, 0x44}, 0x1, 0x0, 0x0, 0x40400c4}, 0x4000001) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r2, r4, 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r5, r7, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=unix,', {[{@version_9p2000='version=9p2000'}, {@cachetag={'cachetag'}}, {@version_u='version=9p2000.u'}, {@access_user='access=user'}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@access_uid={'access', 0x3d, r1}}], [{@fowner_lt={'fowner<', r4}}, {@dont_hash='dont_hash'}, {@fowner_eq={'fowner', 0x3d, r7}}]}}) 01:48:50 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000000)={0x2, 0x4, [0x3]}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000500)=0xc) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@mpls_delroute={0x90, 0x19, 0x1, 0x70bd28, 0x25dfdbfc, {0x1c, 0x0, 0x80, 0xcd, 0x0, 0x2, 0xff, 0xa, 0x400}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x7}, @RTA_VIA={0x14, 0x12, {0x1f, "ed3127e25b017f5d2c60bc9cb49f"}}, @RTA_OIF={0x8, 0x4, r4}, @RTA_VIA={0x14, 0x12, {0x2b, "4ab2c72a088976fdb9959f1a72ff"}}, @RTA_VIA={0x14, 0x12, {0x21, "43d09118d1e039d2e6437272b28f"}}, @RTA_MULTIPATH={0xc, 0x9, {0xc00, 0xe0, 0x0, r7}}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_VIA={0x14, 0x12, {0x28, "f685d6689fe6377f5e4dffdb71ce"}}]}, 0x90}, 0x1, 0x0, 0x0, 0xc1}, 0x4000) 01:48:50 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:48:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000000)=0x4, 0x4) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x83f6) accept4$vsock_stream(r0, &(0x7f0000000000), 0x10, 0x180800) [ 934.453424] lo: Invalid MTU -965725105 requested, hw min 0 [ 934.482063] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 01:48:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'hsr0\x00', 0x4}, 0x18) 01:48:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) getsockname$unix(r1, &(0x7f0000000080), &(0x7f0000000000)=0x6e) 01:48:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:50 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:48:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/100}, 0x6c, 0x3, 0x3800) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000300)={'filter\x00', 0xd0, "a563cfe7ad49751770c1d50c8e4437747387c6302e465437fed38683ce815ffbe9853de96764344f9fac08fc14e41bf8e95d7c0b2c8900a53fb9a1e0099fc6c62313ede63292e3238a51573b55a300df492bcd4af1c9bfca5a5943c17e58d915acec0eae000000000000000000000000655490e07682444a78488fbe0eb0b57b6717133c65375e3e30c60581556482de548d3825f68ecfcff6426a4bad31665c171b389904955aaf855f3aabdeb9b3216b5aa6a5673bed55024741347e7079a51ecc0b6c5b84223b259fba94734ae0a4"}, &(0x7f0000000080)=0xf4) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000100)={r3, r4, 0x8}) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="93b2000000000000000001"], 0x38}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r6, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x3, @media='eth\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x0) 01:48:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$vim2m_VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000140)=0x1) chmod(&(0x7f0000000100)='./file0\x00', 0x10) 01:48:50 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:48:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x128008, 0x0) 01:48:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000019000000000000000000000000000000000004008cb0a563cfe7"], &(0x7f0000000080)=0x2c) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0xc526, 0x1000, 0x2, 0x3f, 0x3, 0xff}) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r2 = socket$inet_icmp(0x2, 0x2, 0x1) sendto$inet(r2, &(0x7f0000000100)="5c90a8f94cd0e53112bc25be5a5e7598ec91f2158ce40c0d2c5cfb072a8a1ba524c03ca209224922364b1ea37a63ea3c379ec32b3aef4ceeb6d1c518a103f4718ca51b03293b20bb76fd0190a1b7a822d3270a44cde41448afe66522ccfe4bc95ca879a50d5f22d674a09887097a281b22b461c8f441d6d214006fb98a2792a1a18bcd03f64bc62b0c0c04064795c1511b27b7d554fded73c9064e28e5fd37bf2b41dde6f311eb84", 0xa8, 0x800, &(0x7f00000001c0)={0x2, 0x4e22, @empty}, 0x10) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:48:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) clock_getres(0x3, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000000)) 01:48:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$P9_RREAD(r1, &(0x7f0000000100)={0xb7, 0x75, 0x2, {0xac, "804aaafd762756150484522c26eebc1d3fa7861b2eda3da83a58b5958c90fbed798dd12af059cb8a7228493aae7dfe9ad05ce692518c0baa5c8dcde8ce73a2b1df6dd697f62004449d3864d5a475c06a794ff60f5df9c6905012200b044d7d8d9a124e6363663eb7816b4d6ec64fca78f2e598287950a39464024abefcac6a6fa089f60630cbfe94f2e90df63bcea7a7af1ef593b8e0e6b5c6875756d05a539bb2a73fa5772c401941b5af34"}}, 0xb7) mount(0x0, 0x0, &(0x7f00005f7ffa)='logfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xfffffffffffffeff, 0x2580) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) r7 = socket$inet6(0xa, 0x2, 0x0) dup(r7) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)={0x200, 0x9, 0x6, 0x0, 0x0, [{{r3}, 0x6}, {{r5}, 0xff}, {{r6}, 0x6}, {{r7}, 0x3}, {{r0}, 0x8001}, {{r0}, 0xff}]}) fcntl$dupfd(r1, 0x406, r2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) 01:48:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0xffffffffffffff2c, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) sendto$inet6(r1, &(0x7f00000001c0)="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", 0xfe, 0x4000084, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x6}, 0x1c) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r2, r4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="67ec47de4f9c9669643d", @ANYRESHEX=r6, @ANYBLOB=',\x00']) write$FUSE_ENTRY(r1, &(0x7f0000000100)={0x90, 0x0, 0x1, {0x2, 0x3, 0x7fff, 0x5, 0x0, 0x1000, {0x0, 0x0, 0x9, 0x7f, 0x9, 0x7, 0x0, 0x4, 0x5, 0x0, 0x8, r4, r6, 0x2, 0x963}}}, 0x90) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x4180, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r7, 0x10e, 0x5, &(0x7f0000000200)=0x1, 0x4) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getpid() 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:48:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab4240200f2ffff03000000000000000000ec00000c09", 0x7a}], 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="1f06c755497e1ec524eef780f866a6fcc08960ce9acdf60b5231687f89c80ef93ca2fc861181391f1ae52398d2ccfc82db639b1969fb5fbbcc38775f108729bedbb03fea21a033347c140ed4eb36280aaae252711f8aebfb83fe57b94c68ecb412cd558fab2872ba7a8bc8e712de51889620dadb45cb79b8ec1b327142036b4291fded0f7d76e6fa621349497b29270fb20bf4a7f929753d37969ac2dd8abb9450c410be448ed37f882176ef60a078f43e06cffeaaf23f3f83146024b2cc", 0xbe, 0x2c978a2f}], 0x41018, &(0x7f0000000280)={[{@utf8='utf8'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x37, 0x32, 0x34, 0x31, 0x64, 0x37, 0x36], 0x2d, [0x30, 0x64, 0x61, 0x37], 0x2d, [0x38, 0x33, 0x35, 0x36], 0x2d, [0x32, 0x31, 0x65, 0x32], 0x2d, [0x32, 0x31, 0x63, 0x9, 0x37, 0x37, 0x36, 0x65]}}}, {@subj_role={'subj_role', 0x3d, 'xfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'xfs\x00'}}, {@pcr={'pcr', 0x3d, 0x2b}}, {@smackfshat={'smackfshat', 0x3d, 'xfs\x00'}}, {@obj_user={'obj_user', 0x3d, '($'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@dont_measure='dont_measure'}]}) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x20a080, 0x0) 01:48:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80000, 0x200000) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000e9b63cfe7"], &(0x7f0000000080)=0x2c) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{0xae, 0x1}, 'port1\x00', 0x10, 0x800, 0x3ff, 0x0, 0x7, 0x0, 0x4, 0x0, 0x7, 0x7}) exit_group(0x0) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r2}, 0x8) r3 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) gettid() r4 = socket$inet6(0xa, 0x8, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x118, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0xfffffffffffffc99, 0x8a, r5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}]}, 0x118}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000880) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r2, 0x8001, 0x5, 0x3ec}, &(0x7f0000000040)=0x10) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) 01:48:51 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) write$binfmt_misc(r0, 0x0, 0xf9) syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10, 0xffffffffffffffff, 0x0) 01:48:51 executing program 4: ioctl$SNDRV_PCM_IOCTL_REWIND(0xffffffffffffffff, 0x40084146, &(0x7f0000000000)=0x2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) geteuid() 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, "5e0d4f56c4167bd3"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) recvfrom$unix(r3, &(0x7f0000000100)=""/181, 0xb5, 0xcb46cbdd22550f07, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:52 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:48:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000002000000004000000a56304e7"], &(0x7f0000000080)=0x28) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, r2, 0xffff, 0x0, 0x0, 0x4e, 0x0, 0xffd3, 0x81, 0x1000, 0x3, 0x0, 'syz0\x00'}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="16000000caa2a9ed3e963c8fb6f73bcf84c1180716996d2ac9d7f51575ba6025c1b20e32937057ffb23a8e399c7db148586747d9bfa206605f477408f8c0bb606c307b5cd48a6b92c3d0b544e2623c5156fc24e4dd1c0ddb9d57c7a145ab44137712a09318e84bcfb64f77785b00495830c1f8b01ca4cab6d49ce8c651a8efa1fe694a04e0d768dd409d925e6334332f4da240", @ANYRES16=r3, @ANYBLOB="100026bd7000fbdbdf2503000000080002000600000005000600010000000500050002000000"], 0x2c}, 0x1, 0x0, 0x0, 0xc840}, 0x404c094) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, r4, 0x0, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={[], [], @private=0xa010101}}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:lib_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4048050}, 0x4081) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r4, 0xbc0122c8cf11464b, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:lib_t:s0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000090}, 0x48000) 01:48:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x20000) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0xc401, &(0x7f0000000200)={[{@index_on='index=on'}, {@xino_auto='xino=auto'}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@nfs_export_off='nfs_export=off'}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@measure='measure'}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) 01:48:52 executing program 1: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r2, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0xa85, 0x4, &(0x7f0000000300)=[{&(0x7f0000000100)="28a846db4b365df13a0eeef81812354086750dc8c1703e34a3e4d0268d4b320e44dfcf87c43bb4f071256caa953c241148a2089ea907f330354841b94fd5a7fcafed3b125ab287c69a111ea17b2f0e436105e0ee", 0x54, 0x375}, {&(0x7f00000001c0)="55899ab63a7d8271b42b064683b516c85781e6cab2215f85707628c55c3bf571dcc4a16a", 0x24, 0x3}, {&(0x7f0000000200)="1e8871e0178641288330", 0xa, 0x18}, {&(0x7f0000000240)="98fa261ed540f96a577d7c21344403ebfed4c70d68722d0a4745c937cd9f7c5f4324e116b5778282386934a970f9312581d8ccf861cf6e93e12996ea1bbb53904380da0dd99986b4bdf86e5ee404515206599bef3d7221aa2e3cab327c81cd302f07de2b23d53b62c8561b73999a8e2edbbe6795a4a50e6f7e0cfb636e3af328d0d310583c65f6688f207c62ec2762cf83ea8622b9abdc09175d13e312fc76b44b65e5e8cde6660eee6acb1c0b05ac2ac3acc8e62cc8", 0xb6, 0x8a}], 0x222008, &(0x7f0000000380)={[{@four_active_logs='active_logs=4'}], [{@measure='measure'}, {@audit='audit'}, {@euid_lt={'euid<', r2}}, {@subj_user={'subj_user', 0x3d, 'xfs\x00'}}]}) 01:48:52 executing program 1: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) [ 936.326193] overlayfs: unrecognized mount option "xino=auto" or missing value [ 936.431990] overlayfs: unrecognized mount option "xino=auto" or missing value 01:48:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000000100)) 01:48:52 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 01:48:52 executing program 1: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) sched_rr_get_interval(r0, &(0x7f0000000000)) 01:48:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x9d0000, 0x3b65, 0x9, r1, 0x0, &(0x7f0000000080)={0x980907, 0x2, [], @value64=0x100}}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) write$FUSE_BMAP(r4, &(0x7f0000000240)={0x18, 0x0, 0x3, {0x80000000}}, 0x18) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r6}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e22, 0x80, @ipv4={[], [], @multicast1}, 0x3}}, 0xd06b, 0x800}, 0x90) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:52 executing program 4: write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:52 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x121041) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x434}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:52 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 01:48:52 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x121041) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="34040000f30301002bbd7000fbdbdf25040000000000000008000000010000002e000000ff0000000001005eb208605f4c617700000000000500000000000000ffffffff03000000070000000700000004000000020000000300000004e00000d50100000400000009000000b697000000fcffffffffff7fff0000005c070000ff070000fdffffff050000008100000001000080000400000500000000000000430c00000300000003000000ffffff7f470c000000000000008000007209000003000000fbffffff6a0900009af900002300000030f7000002000000ffffff7f09000000090000000900000003000000730d000009000000000080000000ff0f00001b65000000000000ff03000006000000060000007f00000002"], 0x434}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000000}, 0x44c41, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:52 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x121041) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x434}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:52 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 01:48:53 executing program 3: ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000080)={0xa, {0x1, 0x80000000, 0x8, 0xfffff001}}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x95, &(0x7f00000001c0)="aac98bbe33a6c4773a4197a6cc9a2105f2c2c560af7a73476400974f373fea61093759eaf6c35e5127ae1a01dee382b123bc250228e23e97314655da4e3a4b9b78f53d4eadfccc5c3114d21ffc307ece3dca2c3447b86fee0ca6737bd0ff43cac7f588544b5f221ab754de2ce0b997f74ecc9b087ea485bc3b6f98a0bda3fb14e2a5f86efc00db14e4f9ea147116a44264351717e3"}) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x5) 01:48:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x121041) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x434}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41, 0x0, 0x0, 0x9}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000180)={0x1, 0x1, 0x4, 0x4, 0x80}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x8400, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x40}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r4 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000140)={0x18, 0x1, 0x0, {0x8}}, 0x18) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r6, 0x8008ae9d, &(0x7f0000000000)=""/88) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:53 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 937.282653] Unknown ioctl -1072655865 01:48:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000a563cfe76344da3cd5819a556c2a8941d03aba9e60b6feb0cf5a751b4f5e866e1db3ba55df5cd46c7ed19ebb243328c1d51927febba28f29dd02f13ec4749d5087412382b088534f035b5d01785074be80ddc5f3ccef9a55e4063f5f6cbe2a2c427e5ef831e1989dbcf8b6d17ce6ac7aa6c87483077f4c71906287a3e93039ea330265b4535d142a12d471231c8e96d54409efff816a0ff3da48a71fbb4bda4c6b054b70dff1520987fb74af3df91d48595568daad1554aa7c981d144b670eccef57a84f7d087e6cb15e567de970404fde1ced6535"], &(0x7f0000000080)=0x2c) mknodat(r1, &(0x7f0000000000)='./file0\x00', 0x200, 0x8c464e70) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x1}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f0000000140)=0x6) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000200)={{{0x5}}, 0xea, 0x6, &(0x7f0000000100)="34fd1fdb78e76a43c3d7ff634382b51c8102ec864b760c5cefe955e5e87ff1b47cd45b1ad061f6450510f75cdd878a67ff9ce68cac2feaeceda13fd689a307f9c1e22b10163bbdd5b34f3e9570c2c8a2079c95bec0b41ecf25de237dc3398c89dbb98df75d8c9ca50ea70a51c62b6767e59806e016845dff37da504f48253b9b8b96bc7819ed9fd277a6a5db93918a496c99d5d29cc4d681fed4b4b4589cd1d1681f048245d99951513043ccfb5a5a02ef9c4dd0d327c6d56fa14f7e4d95c9b89c581cf3a217e38df31a00bba0a7777072c874f43f9c2167fe3a72429ac4296410aba70d316be7a67dd6"}) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x800, 0x0) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000040)) 01:48:53 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 5: sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x434}}, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xc00) 01:48:53 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r0, 0x40184150, &(0x7f0000000100)={0x0, &(0x7f0000000080)="aacae51d11e2f772371dcdbbf2a243da7826e5d1530ab3db4333eab45f246cb4f88877e2748251ae4ffde1c0a438b0c6c36a4edbad78a107aacbb245684cb9b180d1aaa75c215ef1f3d51fbf3cfe0dda484ba556cff27190618201d1ed2d2d38b9e0c550d07f98db4985f30a5bd68f2dce21254c0e7ed81eb164", 0x7a}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x44, 0x0, 0x0, 0x8000, 0x0) prctl$PR_GET_KEEPCAPS(0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 01:48:53 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x101) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000000)=0x80) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 01:48:53 executing program 5: sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="34040000f30301002bbd7000fbdbdf25040000000000000008000000010000002e000000ff0000000001005eb208605f4c617700000000000500000000000000ffffffff03000000070000000700000004000000020000000300000004e00000d50100000400000009000000b697000000fcffffffffff7fff0000005c070000ff070000fdffffff050000008100000001000080000400000500000000000000430c00000300000003000000ffffff7f470c000000000000008000007209000003000000fbffffff6a0900009af900002300000030f7000002000000ffffff7f09000000090000000900000003000000730d000009000000000080000000ff0f00001b65000000000000ff03000006000000060000007f00000002"], 0x434}}, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xc00) 01:48:53 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 5: sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="34040000f30301002bbd7000fbdbdf25040000000000000008000000010000002e000000ff0000000001005eb208605f4c617700000000000500000000000000ffffffff03000000070000000700000004000000020000000300000004e00000d50100000400000009000000b697000000fcffffffffff7fff0000005c070000ff070000fdffffff050000008100000001000080000400000500000000000000430c00000300000003000000ffffff7f470c000000000000008000007209000003000000fbffffff6a0900009af900002300000030f7000002000000ffffff7f09000000090000000900000003000000730d000009000000000080000000ff0f00001b65000000000000ff03000006000000060000007f00000002"], 0x434}}, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xc00) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 01:48:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) statx(r1, &(0x7f0000000040)='./file0/file0\x00', 0x400, 0x8, &(0x7f0000000100)) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mbind(&(0x7f000040b000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x3) 01:48:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3fffffa, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000, 0x0) 01:48:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 01:48:53 executing program 5: r0 = syz_open_dev$evdev(0x0, 0x3, 0x121041) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x434}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xc00) 01:48:53 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 01:48:53 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 01:48:53 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25269, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) ppoll(&(0x7f0000000040)=[{r2, 0x60}, {r3, 0x58c}, {r0, 0x44c0}, {r0, 0x20}, {r5, 0x4000}, {r0, 0x6}], 0x6, &(0x7f0000000100), &(0x7f0000000140)={[0x4]}, 0x8) 01:48:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x8080, 0x0, 0x200000, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) r1 = msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000001640)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(r2, &(0x7f0000000700)={0x0, ""/188}, 0xc4, 0x2, 0x0) msgsnd(r2, &(0x7f0000000040)={0x2}, 0x8, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, "a563cfe7"}, &(0x7f0000000080)=0x2c) msgsnd(r1, &(0x7f0000001240)=ANY=[@ANYRESOCT=r2, @ANYRES16, @ANYRES32, @ANYRESDEC], 0x1, 0x0) msgrcv(r1, &(0x7f0000000700)={0x0, ""/188}, 0xc4, 0x2, 0x0) msgsnd(r1, &(0x7f0000000040)={0x2}, 0x8, 0x0) msgsnd(r1, &(0x7f0000000200)={0x2, "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