[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.352290][ T26] audit: type=1800 audit(1561741290.608:25): pid=8557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 53.373795][ T26] audit: type=1800 audit(1561741290.608:26): pid=8557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 53.394334][ T26] audit: type=1800 audit(1561741290.608:27): pid=8557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.28' (ECDSA) to the list of known hosts. 2019/06/28 17:01:42 fuzzer started 2019/06/28 17:01:46 dialing manager at 10.128.0.26:44829 2019/06/28 17:01:46 syscalls: 2465 2019/06/28 17:01:46 code coverage: enabled 2019/06/28 17:01:46 comparison tracing: enabled 2019/06/28 17:01:46 extra coverage: extra coverage is not supported by the kernel 2019/06/28 17:01:46 setuid sandbox: enabled 2019/06/28 17:01:46 namespace sandbox: enabled 2019/06/28 17:01:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/28 17:01:46 fault injection: enabled 2019/06/28 17:01:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/28 17:01:46 net packet injection: enabled 2019/06/28 17:01:46 net device setup: enabled 17:04:07 executing program 0: syzkaller login: [ 210.313760][ T8725] IPVS: ftp: loaded support on port[0] = 21 17:04:07 executing program 1: [ 210.421320][ T8725] chnl_net:caif_netlink_parms(): no params data found [ 210.503351][ T8725] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.526705][ T8725] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.534900][ T8725] device bridge_slave_0 entered promiscuous mode [ 210.544887][ T8725] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.552225][ T8725] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.567615][ T8725] device bridge_slave_1 entered promiscuous mode [ 210.599047][ T8725] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.610546][ T8725] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.632466][ T8728] IPVS: ftp: loaded support on port[0] = 21 17:04:07 executing program 2: inotify_init() preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000fa, 0x0) [ 210.650009][ T8725] team0: Port device team_slave_0 added [ 210.671741][ T8725] team0: Port device team_slave_1 added [ 210.759652][ T8725] device hsr_slave_0 entered promiscuous mode [ 210.797148][ T8725] device hsr_slave_1 entered promiscuous mode 17:04:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 210.912491][ T8730] IPVS: ftp: loaded support on port[0] = 21 [ 210.955445][ T8725] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.962736][ T8725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.970534][ T8725] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.977654][ T8725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.049708][ T8728] chnl_net:caif_netlink_parms(): no params data found [ 211.083782][ T8733] IPVS: ftp: loaded support on port[0] = 21 17:04:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x400000000018) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x400, 0x0, 0x0, 0x1f}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 211.149900][ T8725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.209886][ T8725] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.219172][ T8728] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.226249][ T8728] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.235507][ T8728] device bridge_slave_0 entered promiscuous mode [ 211.245608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.260073][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.281071][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.300532][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 211.368100][ T8728] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.375202][ T8728] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.385796][ T8728] device bridge_slave_1 entered promiscuous mode [ 211.393656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.407445][ T12] bridge0: port 1(bridge_slave_0) entered blocking state 17:04:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="39000000130009006900000000000000ab00804806000000c60001070000001419001400da083986d2d760d745f26d8c1c0afcf193bf960000", 0x39}], 0x1) [ 211.414516][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.431167][ T8738] IPVS: ftp: loaded support on port[0] = 21 [ 211.499263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.508692][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.515760][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.550895][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.559973][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.569220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.579531][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.600268][ T8740] IPVS: ftp: loaded support on port[0] = 21 [ 211.606452][ T8728] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.620844][ T8728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.630452][ T8730] chnl_net:caif_netlink_parms(): no params data found [ 211.648700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.657591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.665851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.674446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.687520][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.696085][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.745613][ T8725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.756236][ T8728] team0: Port device team_slave_0 added [ 211.765902][ T8728] team0: Port device team_slave_1 added [ 211.774178][ T8730] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.781473][ T8730] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.789475][ T8730] device bridge_slave_0 entered promiscuous mode [ 211.798794][ T8730] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.805839][ T8730] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.813951][ T8730] device bridge_slave_1 entered promiscuous mode [ 211.949588][ T8728] device hsr_slave_0 entered promiscuous mode [ 211.987354][ T8728] device hsr_slave_1 entered promiscuous mode [ 212.031656][ T8730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.043358][ T8730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.071172][ T8733] chnl_net:caif_netlink_parms(): no params data found [ 212.092177][ T8730] team0: Port device team_slave_0 added [ 212.103651][ T8730] team0: Port device team_slave_1 added [ 212.178585][ T8730] device hsr_slave_0 entered promiscuous mode [ 212.236964][ T8730] device hsr_slave_1 entered promiscuous mode [ 212.354597][ T8733] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.362646][ T8733] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.370651][ T8733] device bridge_slave_0 entered promiscuous mode [ 212.378336][ T8733] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.385565][ T8733] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.393439][ T8733] device bridge_slave_1 entered promiscuous mode [ 212.423672][ T8733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.436457][ T8725] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.460776][ T8738] chnl_net:caif_netlink_parms(): no params data found [ 212.481577][ T8733] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.508117][ T8730] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.515195][ T8730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.522577][ T8730] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.529673][ T8730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.569466][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.579942][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.590591][ T8733] team0: Port device team_slave_0 added [ 212.601870][ T8733] team0: Port device team_slave_1 added [ 212.679493][ T8733] device hsr_slave_0 entered promiscuous mode [ 212.727169][ T8733] device hsr_slave_1 entered promiscuous mode [ 212.791453][ T8740] chnl_net:caif_netlink_parms(): no params data found [ 212.861816][ T8740] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.876014][ T8740] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.892862][ T8740] device bridge_slave_0 entered promiscuous mode [ 212.901508][ T8740] bridge0: port 2(bridge_slave_1) entered blocking state 17:04:10 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x9, 0x101000) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x0) r2 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r2, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f0000000000)=0x2, 0x303) sendto$inet(r2, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000003c80), 0x38e, 0x62, 0x0) [ 212.908797][ T8740] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.921110][ T8740] device bridge_slave_1 entered promiscuous mode [ 212.954633][ T8738] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.964248][ T8738] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.979548][ T8738] device bridge_slave_0 entered promiscuous mode 17:04:10 executing program 0: syz_emit_ethernet(0x112, &(0x7f0000000080)={@random="2fb08375220f", @empty, [], {@ipv4={0x800, {{0x3d, 0x4, 0xfffffffffffff800, 0x5, 0x104, 0x68, 0x7, 0x4, 0x4, 0x0, @empty, @loopback, {[@end, @cipso={0x86, 0x70, 0x0, [{0x7, 0xd, "8eb60c2af94f88fc179810"}, {0x6, 0x11, "5855ee1b18c3a1e4ad4158aa5e8095"}, {0x7, 0xd, "afcc171eef0ecf7058a662"}, {0x5, 0x9, "21534e836ac1a9"}, {0x0, 0xc, "549e948c759a651d012a"}, {0x0, 0x10, "7a94a31079275db23dff5efccd0d"}, {0x7, 0x11, "6191c9311527b46f101ddb85f5a1d9"}, {0x0, 0x9, "4e799269b59b77"}]}, @cipso={0x86, 0x45, 0x8, [{0x0, 0x10, "c9dd7f055820b8da62ce98361747"}, {0x5, 0x5, "03659a"}, {0x6, 0x12, "ee786482073e08b7ed80d2ab046fc375"}, {0x1, 0x5, "a06a12"}, {0x0, 0x4, "30b7"}, {0x0, 0x9, "86065f5d77bf72"}, {0x0, 0x6, "e38db8cd"}]}, @timestamp={0x44, 0x28, 0xfff, 0x0, 0x400, [{[], 0x7f}, {[@initdev={0xac, 0x1e, 0x1, 0x0}], 0x7ff}, {[], 0x4}, {[@rand_addr=0x4000000000000000], 0x2}, {[], 0x3}, {[@rand_addr=0x401], 0x9}]}, @noop, @noop]}}, @dccp={{0x4e20, 0x4e22, 0x4, 0x1, 0x1ff, 0x0, 0x0, 0x5, 0xff00000000, "75b228", 0x1, "478282"}}}}}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0xf, &(0x7f00000001c0)=0x4) [ 213.015068][ T8738] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.025064][ T8738] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.043910][ T8738] device bridge_slave_1 entered promiscuous mode [ 213.059924][ T8728] 8021q: adding VLAN 0 to HW filter on device bond0 17:04:10 executing program 0: syz_emit_ethernet(0x1d8, &(0x7f0000017f07)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @loopback}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x5, 0x0, 0x4}}}}}}, 0x0) [ 213.086327][ T8730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.101162][ T8740] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 17:04:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001080)="c0dca5055e0bcfec7be070") ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x0, 0x40000000000031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e20, @empty}}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs={0x40486311}], 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x7, 0x9300) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f0000000100)=0x54) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000180), 0x10) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) [ 213.138819][ T8738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.161492][ T8738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.210509][ T8728] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.226534][ T8740] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.254679][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.262904][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.270857][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.279404][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.297642][ T8738] team0: Port device team_slave_0 added [ 213.314038][ T8740] team0: Port device team_slave_0 added [ 213.337452][ T8764] binder: 8763:8764 ioctl c0306201 20a20000 returned -14 [ 213.344308][ T8733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.358964][ T8738] team0: Port device team_slave_1 added 17:04:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)='veth1_to_hsr\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200000, 0x8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) [ 213.365687][ T8740] team0: Port device team_slave_1 added [ 213.367374][ T8765] binder: 8763:8765 ioctl c0306201 20a20000 returned -14 [ 213.374906][ T8730] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.388200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.405159][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.422813][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.429936][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.443926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.453730][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.462508][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.469620][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.477433][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.512270][ T8770] NFS: bad mount option value specified: veth1_to_hsr [ 213.529050][ T8733] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.546167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.554739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.563934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.571871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:04:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x80000003, 0x180400) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000080)={0x6, 0x5f, "725d383b18559f579ea48274e9c9c7e7cbe2841797d6fa9991226a09885d38c7fdbaf31f2162c8111fbe52e67bb5f0d3803f1ec63949191595f8ef9a89a4695c8829574a54fe5a52db6b5fd506707164443fa9ec39c95d58c700fa4d7eedb9"}) [ 213.580506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.597567][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.606091][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.619861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.631357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.640363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.648978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.658136][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.666508][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.673604][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 17:04:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x100000000, 0x10001, 0x4, 0x6, 0x6, 0x2, 0x4, 0x2, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x5f1}, 0x8) connect$rose(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000240)) r3 = socket(0x100000000000011, 0x3, 0x81) bind(r3, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) sendfile(r0, r4, 0x0, 0x800000000024) [ 213.713527][ T8728] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.734112][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.766100][ C0] hrtimer: interrupt took 46430 ns [ 213.809638][ T8740] device hsr_slave_0 entered promiscuous mode [ 213.837013][ T8740] device hsr_slave_1 entered promiscuous mode [ 213.919241][ T8738] device hsr_slave_0 entered promiscuous mode [ 213.944358][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 213.944370][ T26] audit: type=1804 audit(1561741451.198:31): pid=8783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir060926130/syzkaller.RTH9Io/7/bus" dev="sda1" ino=16521 res=1 [ 213.983689][ T8738] device hsr_slave_1 entered promiscuous mode [ 214.047905][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.056072][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.064794][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.073348][ T2995] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.080561][ T2995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.088937][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.097735][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.106003][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.114291][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.122853][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.131815][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.140111][ T2995] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.147205][ T2995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.155906][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.199161][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.210878][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.220944][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.228191][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.235981][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.245404][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.253902][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.262533][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.270907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.279773][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.288697][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.296404][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.342864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.353715][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.362203][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.371414][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.379888][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.388243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.396292][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.405032][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.413647][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.422441][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.431220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.440106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.451130][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.465164][ T8728] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.484590][ T8738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.508816][ T8730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.540352][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.554702][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.570392][ T8738] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.593685][ T8733] 8021q: adding VLAN 0 to HW filter on device batadv0 17:04:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x100000000, 0x10001, 0x4, 0x6, 0x6, 0x2, 0x4, 0x2, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x5f1}, 0x8) connect$rose(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000240)) r3 = socket(0x100000000000011, 0x3, 0x81) bind(r3, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) sendfile(r0, r4, 0x0, 0x800000000024) [ 214.613001][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.623203][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.647234][ T2995] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.654321][ T2995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.665357][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.680836][ T8740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.714113][ T8730] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.726278][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.735752][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.745887][ T8736] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.753007][ T8736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.762449][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.786814][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.794586][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.836193][ T8740] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.855720][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.865940][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.879551][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.893701][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.904780][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.918679][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.972479][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.988501][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.999558][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.031310][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.061812][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.069057][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.081508][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.090352][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.104686][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.111799][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.126102][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.135124][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.165002][ T8738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 215.178183][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.200570][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.217621][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.237627][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.255484][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.265497][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.288040][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.303800][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.312238][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.321607][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.329895][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.338542][ T8747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.348381][ T8740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.363168][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.392897][ T8738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.413168][ T8740] 8021q: adding VLAN 0 to HW filter on device batadv0 17:04:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) epoll_wait(r0, &(0x7f0000000000)=[{}, {}, {}], 0x3, 0x9211) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x95, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x113, 0x7}}, 0x20) msgget(0x0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100)=0xdfef, r3, 0x0, 0x0, 0x1}}, 0x20) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x500ffc, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa5) 17:04:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x100000000, 0x10001, 0x4, 0x6, 0x6, 0x2, 0x4, 0x2, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x5f1}, 0x8) connect$rose(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000240)) r3 = socket(0x100000000000011, 0x3, 0x81) bind(r3, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) sendfile(r0, r4, 0x0, 0x800000000024) [ 215.594720][ T8828] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:04:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80000, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000140)=0x6) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xd, 0x0, 0x70d000, 0x0, 0x2}}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0xffffffff, 0x5, 0x9000}, 0xbe) 17:04:13 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4000, 0x0) sendto$isdn(r1, &(0x7f0000000140)={0xffffffffffffff00, 0x3, "05ba86c0385f7afd07b7825df54eb258136b4c290a56355f39d5bd3b3ba3cb4fcc3ac71607ce9ef2d8849b20ef283b5b5746fe937e8014911284d0cbcc399c5a3b6b560d0d3adcd96dc3660a19dcaa53fa6abd19d36e96c7ca0c252930b19eb6f4259604a3e855bedeeead1e83f862bdb54229b7753fc768d03ea41096234d03ee05f9b7a78997fa948133e2cda8ab07b57f3cd141ea180ff5a7f09f8182fbb03b12ff7502e20ce9b707a2d7c13efc22e8f78dfbc5d95963263faad9c7211c96c76ae7e5f8f5c84ac622602d1b7c3c804c051becfc2ddb4fc63e7d4eeb4cea59ed38ff9b501bff5aa72c3fc91e2afe2240872b9e983f6d81a94073"}, 0x103, 0x4, &(0x7f0000000080)={0x22, 0x10000, 0xff, 0x6, 0x3}, 0x6) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x4e20, @multicast1}}) fchdir(r0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 17:04:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x0, 0x0) inotify_init1(0x400000007fff9) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='logon\x00', 0x0, &(0x7f00000005c0)="76ae32d976f48987ef377e37598e733e4365c8c24f5343b776b903a40e3b462a11a22c520c6c88e97e506c8e4d8c4c8057d61a97988f", 0x36, 0xfffffffffffffffb) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x80000) r0 = syz_open_dev$midi(&(0x7f0000001c00)='/dev/midi#\x00', 0x2, 0x300) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0xffffff15) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 17:04:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/31, 0x1f) getdents64(r0, &(0x7f0000000080)=""/4096, 0x18) 17:04:13 executing program 3: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000280)={0x7, @pix_mp={0x2, 0x100000000, 0x30383653, 0x0, 0xf, [{0xeee, 0x8}, {0x5, 0x8001}, {0x1ff}, {0x1, 0x80000001}, {0x3, 0x8797000000}, {0x7fff, 0x83ba}, {0xca9c, 0x7ff}, {0x8001, 0x62e}], 0x9, 0x4, 0x2, 0x1, 0x6}}) 17:04:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffdffffa}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") read(r1, &(0x7f0000000180)=""/191, 0x21) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:04:13 executing program 2: r0 = socket$inet6(0xa, 0x7, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) r1 = getpid() pipe(0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000100)={0x0, 0x1, 0x7fffffff}) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000c40)={0x0, 0x70, 0x7, 0x426, 0x0, 0x7, 0x0, 0x0, 0x8010, 0x0, 0x3, 0x7fff, 0x2, 0x5, 0x73f6, 0x1b2, 0x3, 0xfffffffffffffffb, 0x44a4, 0x10000, 0x8, 0x7, 0x0, 0x1f, 0x0, 0x27fe, 0x0, 0x100, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext={0x2, 0x5}, 0x21800, 0x7f, 0x4, 0x0, 0x3ff, 0x9, 0x1}) r6 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x8000001a, 0x7, 0x0, 0x362) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, 0x0, &(0x7f00000009c0)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000a00)={0x0, 0x9}, 0x8) clock_gettime(0x0, &(0x7f0000000ac0)={0x0, 0x0}) utimes(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000b00)={{0x77359400}, {r7, r8/1000+30000}}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000a40)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000000c0)=0x3, 0x2) 17:04:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x20000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000040)="c744240000300000c744240205000000c7442406000000000f011c24b80e0000000f23c00f21f835030004000f23f80f0139440f20c0350a000000440f22c08216dcdc03f2260f225d0f01ca0f0866b80e008ee0", 0x54}], 0x1, 0x0, 0x0, 0xfffffffffffffd94) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$sock_rose_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x6, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000280)={{0x6, 0x200, 0x0, 0x200000000000000, 0x1, 0x2}, 0x40, 0x5, 0x3, 0x8, 0x4, "e94a0c9ead81060024a87d7a70c71c6ae48b5a85b61fa63038c3cf9a36e4c47c6b6664b6eae637900162c054318e3c3dc89e9a4789db01ed4db4f24384c3d12e0822b3ccead55dee8fd1620470d267434e65b5b9ec3aedb5efc9942b1e6b425a94767df7fa5ba3c6a5d4db12b7d4ad5ed4c6525144f74c2d113680d92878175a"}) getpeername$netlink(r3, &(0x7f0000000200), &(0x7f0000000240)=0xc) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$LOOP_SET_CAPACITY(r4, 0x4c07) 17:04:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x0, 0x0) inotify_init1(0x400000007fff9) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='logon\x00', 0x0, &(0x7f00000005c0)="76ae32d976f48987ef377e37598e733e4365c8c24f5343b776b903a40e3b462a11a22c520c6c88e97e506c8e4d8c4c8057d61a97988f", 0x36, 0xfffffffffffffffb) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x80000) r0 = syz_open_dev$midi(&(0x7f0000001c00)='/dev/midi#\x00', 0x2, 0x300) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0xffffff15) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 17:04:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x0, 0x0) inotify_init1(0x400000007fff9) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='logon\x00', 0x0, &(0x7f00000005c0)="76ae32d976f48987ef377e37598e733e4365c8c24f5343b776b903a40e3b462a11a22c520c6c88e97e506c8e4d8c4c8057d61a97988f", 0x36, 0xfffffffffffffffb) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x80000) r0 = syz_open_dev$midi(&(0x7f0000001c00)='/dev/midi#\x00', 0x2, 0x300) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0xffffff15) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) [ 216.313984][ T8856] XFS (loop3): Mounting V4 Filesystem 17:04:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0xe1, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000740)={0x5, 0x10, 0xfa00, {&(0x7f00000004c0), r2, 0x1}}, 0x18) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r0, 0x403, r3) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendto$rose(r5, &(0x7f0000000340)="021becb56a96143eeb9fdf72864814ef1bb64f381a8bb373a6415084d751846d8c83597aa0b8e45addffe71de85db559ba1fa3489641423697d053e7f476a81d359cc382439c9c068611aff5a843a5a91fef97335e15558c37846c11f014645ac8aef5ead1e5b8376430ba74c84f89abb75f195541206cbaee5419ebe0e6294f386d302a732e60c3b4f7baa7a4bd25b442a7e096315895534ecf21d6f3ba3d3153420c31b41dc11f801615b84384539c7cca61a3be4adcb8d887479851a442be275ff080214d72ef80395b3430a004ae4d8500d92c38b4a2f8cd747be60e961be9ed7039d03f40d856378bf76dfca553bb7d4f8a6ee63150", 0xf8, 0x0, &(0x7f0000000440)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @bcast}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r6 = socket(0x5, 0x2, 0x4) sendmsg$nl_netfilter(r6, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="c00000000e0b00f729bd7000fedbdf250f00000518db61ef2ddda0ed9b0126348528258b587e540a7e16b8f70b52d8d69f01f0212098ef903503bae0e58b313d051bf29811342707130137ba3cf226e2f81309fcaf622b0488affb5962ec7d296abe04b783c508bc2b0225422ff4a6d0a82f5a0e2fe7f8875a270c0173ca3331de63c48978aaeb1f2c21b2d151b2f8f246bc253ac71ac48778b8013625dfe37cfa2f970f407ba98168bfc2be7497cb4f75b95b63245d5c00bc371e1a54000000"], 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r7, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 216.384322][ T8856] XFS (loop3): empty log check failed [ 216.452008][ T8856] XFS (loop3): log mount/recovery failed: error -5 [ 216.627687][ T8856] XFS (loop3): log mount failed 17:04:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x0, 0x0) inotify_init1(0x400000007fff9) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='logon\x00', 0x0, &(0x7f00000005c0)="76ae32d976f48987ef377e37598e733e4365c8c24f5343b776b903a40e3b462a11a22c520c6c88e97e506c8e4d8c4c8057d61a97988f", 0x36, 0xfffffffffffffffb) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x80000) r0 = syz_open_dev$midi(&(0x7f0000001c00)='/dev/midi#\x00', 0x2, 0x300) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0xffffff15) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 17:04:13 executing program 2: r0 = socket$inet6(0xa, 0x7, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) r1 = getpid() pipe(0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000100)={0x0, 0x1, 0x7fffffff}) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000c40)={0x0, 0x70, 0x7, 0x426, 0x0, 0x7, 0x0, 0x0, 0x8010, 0x0, 0x3, 0x7fff, 0x2, 0x5, 0x73f6, 0x1b2, 0x3, 0xfffffffffffffffb, 0x44a4, 0x10000, 0x8, 0x7, 0x0, 0x1f, 0x0, 0x27fe, 0x0, 0x100, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext={0x2, 0x5}, 0x21800, 0x7f, 0x4, 0x0, 0x3ff, 0x9, 0x1}) r6 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x8000001a, 0x7, 0x0, 0x362) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, 0x0, &(0x7f00000009c0)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000a00)={0x0, 0x9}, 0x8) clock_gettime(0x0, &(0x7f0000000ac0)={0x0, 0x0}) utimes(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000b00)={{0x77359400}, {r7, r8/1000+30000}}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000a40)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000000c0)=0x3, 0x2) 17:04:14 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x82400) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000140)={0x0, 0x100, 0x0, {}, 0x401, 0xc}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x2}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x40000000000001) fallocate(r2, 0x0, 0x0, 0x4003ff) write$cgroup_type(r2, &(0x7f00000000c0)='threaded\x00', 0xfbca) fallocate(r2, 0x3, 0x8004, 0x7fff) fallocate(r2, 0x3, 0x5e89, 0xfff9) 17:04:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000180)='.self,\x00', 0x4) write$P9_ROPEN(r1, &(0x7f0000000000)={0x18}, 0x18) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) sendfile(r1, r1, &(0x7f0000000280), 0x7f8) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x400, 0x8000) 17:04:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0xe1, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000740)={0x5, 0x10, 0xfa00, {&(0x7f00000004c0), r2, 0x1}}, 0x18) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r0, 0x403, r3) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendto$rose(r5, &(0x7f0000000340)="021becb56a96143eeb9fdf72864814ef1bb64f381a8bb373a6415084d751846d8c83597aa0b8e45addffe71de85db559ba1fa3489641423697d053e7f476a81d359cc382439c9c068611aff5a843a5a91fef97335e15558c37846c11f014645ac8aef5ead1e5b8376430ba74c84f89abb75f195541206cbaee5419ebe0e6294f386d302a732e60c3b4f7baa7a4bd25b442a7e096315895534ecf21d6f3ba3d3153420c31b41dc11f801615b84384539c7cca61a3be4adcb8d887479851a442be275ff080214d72ef80395b3430a004ae4d8500d92c38b4a2f8cd747be60e961be9ed7039d03f40d856378bf76dfca553bb7d4f8a6ee63150", 0xf8, 0x0, &(0x7f0000000440)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @bcast}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r6 = socket(0x5, 0x2, 0x4) sendmsg$nl_netfilter(r6, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="c00000000e0b00f729bd7000fedbdf250f00000518db61ef2ddda0ed9b0126348528258b587e540a7e16b8f70b52d8d69f01f0212098ef903503bae0e58b313d051bf29811342707130137ba3cf226e2f81309fcaf622b0488affb5962ec7d296abe04b783c508bc2b0225422ff4a6d0a82f5a0e2fe7f8875a270c0173ca3331de63c48978aaeb1f2c21b2d151b2f8f246bc253ac71ac48778b8013625dfe37cfa2f970f407ba98168bfc2be7497cb4f75b95b63245d5c00bc371e1a54000000"], 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r7, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:04:14 executing program 3: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000280)={0x7, @pix_mp={0x2, 0x100000000, 0x30383653, 0x0, 0xf, [{0xeee, 0x8}, {0x5, 0x8001}, {0x1ff}, {0x1, 0x80000001}, {0x3, 0x8797000000}, {0x7fff, 0x83ba}, {0xca9c, 0x7ff}, {0x8001, 0x62e}], 0x9, 0x4, 0x2, 0x1, 0x6}}) 17:04:14 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYRESDEC], 0x12) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) unlink(&(0x7f0000000200)='./file0/file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:04:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup(r0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0xffffffffffffff01, 0x7}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) ioctl$int_in(r1, 0x5421, &(0x7f0000000380)=0x400000000800) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) sendfile(r1, r3, 0x0, 0x10000) 17:04:14 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x40000) read$alg(r0, &(0x7f0000000280)=""/43, 0x2b) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) syz_open_procfs(0x0, &(0x7f0000000240)='setgroups\x00') [ 217.197871][ T8927] XFS (loop3): Mounting V4 Filesystem [ 217.244263][ T8927] XFS (loop3): empty log check failed [ 217.270216][ T8927] XFS (loop3): log mount/recovery failed: error -5 17:04:14 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r1, 0x3c, 0x0, @ib={0x1b, 0x25db, 0x54, {"d432055658cb3617067c208009d69cb4"}, 0x7, 0x80, 0x133}}}, 0x90) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xf66563ff558e6c69, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {}, [@IFA_CACHEINFO={0xf}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x14c}}, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000280)=""/212) 17:04:14 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) r2 = socket$alg(0x26, 0x5, 0x0) shutdown(r1, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x400000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad66b6b30400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r0, 0x0, 0x401, 0xd) [ 217.346787][ T8927] XFS (loop3): log mount failed [ 217.369858][ T8954] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 17:04:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup(r0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0xffffffffffffff01, 0x7}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) ioctl$int_in(r1, 0x5421, &(0x7f0000000380)=0x400000000800) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) sendfile(r1, r3, 0x0, 0x10000) 17:04:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup(r0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0xffffffffffffff01, 0x7}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) ioctl$int_in(r1, 0x5421, &(0x7f0000000380)=0x400000000800) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) sendfile(r1, r3, 0x0, 0x10000) 17:04:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x1468, 0x1, 0x93e, 0x5, 0xb602, 0x3, 0x3f, 0xb7e, 0x2e0, 0x38, 0x2dd, 0x20, 0x1, 0x20, 0x1, 0x4, 0x1, 0x2}, [{0x60000005, 0x20, 0x6, 0x8, 0x0, 0x7, 0x6, 0xffffffffffffffc1}, {0x3, 0x100000000, 0x6, 0x6bc, 0x80000000, 0x9, 0xa4, 0x6}], "cd1338e98f5e7dd1f35bc1182bad69e5da7b940c2f01af447d04031732ae00292a5b8e422524dfafcc6ea9d4fc5081db55ad8d184a29b98559289a5eda3602a616517584a5bf5ea1b5c8d6a10421ddbcf1da2bf4e3d32b65fe2a89227d6cc83b67601e1d0d9081c351716267995a1700d93d9c6c3ee4f8282727b812f6b0e56c7d8136e270", [[], [], [], [], [], [], [], [], [], []]}, 0xafd) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x40) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000040)=""/207, &(0x7f0000000140)=0xcf) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x9, 0x2) ioctl$int_out(r2, 0x5462, &(0x7f00000001c0)) 17:04:14 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fe, 0x4403) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv4_getnetconf={0x54, 0x52, 0x302, 0x70bd2c, 0x25dfdbfe, {}, [@NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_FORWARDING={0x8, 0x2, 0x100000000}, @NETCONFA_RP_FILTER={0x8, 0x3, 0xfffffffffffffc00}, @NETCONFA_IFINDEX={0x8, 0x1, r1}, @NETCONFA_FORWARDING={0x8, 0x2, 0x1000}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x10000}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x5) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x0, 0x40000002], [0xc1]}) 17:04:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="040000000000000002004e22000000000000000000000000000000000000000000000000000000000000ef360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000400000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000812ea9600000000002004e23e00000010000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20000000080000000000000000000000000000000000000000000000dc5721d900000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e228000000100"/656], 0x290) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user='access=user'}]}}) 17:04:15 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x2, 0x80) readv(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000900)={0x0, @ctrl}) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) bind$rds(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000800)=""/67) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:04:15 executing program 3: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000280)={0x7, @pix_mp={0x2, 0x100000000, 0x30383653, 0x0, 0xf, [{0xeee, 0x8}, {0x5, 0x8001}, {0x1ff}, {0x1, 0x80000001}, {0x3, 0x8797000000}, {0x7fff, 0x83ba}, {0xca9c, 0x7ff}, {0x8001, 0x62e}], 0x9, 0x4, 0x2, 0x1, 0x6}}) 17:04:15 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerle0\x00\x00\x00\x00\x00\x00\x00\x00']) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x8000) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000200)={0x3, 0x2f4, 0x1}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x48, 0x0) io_setup(0x7, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000280)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0xfb03, 0x0, 0x0, r1}]) 17:04:15 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000000c0)=0x7) clock_adjtime(0x0, &(0x7f00000006c0)={0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffff26fb, 0x0, 0xfffffffeffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x80000) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000040)) [ 217.930573][ T8992] overlayfs: unrecognized mount option "lowerle0" or missing value [ 217.989265][ T8992] overlayfs: unrecognized mount option "lowerle0" or missing value [ 218.010656][ T8988] XFS (loop3): Mounting V4 Filesystem [ 218.041618][ T8988] XFS (loop3): empty log check failed [ 218.055726][ T8988] XFS (loop3): log mount/recovery failed: error -5 [ 218.117163][ T8988] XFS (loop3): log mount failed 17:04:15 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e22, 0x3, @mcast1, 0x6}}, 0x0, 0x7fffffff, 0x0, "ae3b7e312e91192f02e4ab7c45a7da79852d24498317bba8ec929c26f1a949170be26de8db1dfcd994530722d887a126a8225fe2f0d2ac702f325d7a687b895e4efdf10a242d86aec7c7b47c06562f7d"}, 0xd8) rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) 17:04:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000080)=""/205) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r3, &(0x7f0000000000)={0x9, @remote={[], 0x1}}, 0x12) syz_genetlink_get_family_id$tipc(0x0) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x40000800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 17:04:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dc710c0800cfec7be070") perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = getpgid(0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x1f, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x9, 0x3}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x4, 0x0, 0x7}, &(0x7f0000000180)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x80000000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, r1, 0x0, 0x2, &(0x7f0000000000)='/\x00', r4}, 0x30) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x21) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:04:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000100)) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x3, &(0x7f0000000200)={{{@in=@initdev, @in6=@rand_addr="b92516c8186b917b65c2e4f438e6397f"}}, {{@in6=@loopback}, 0x0, @in=@dev}}, 0xe8) 17:04:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="040000000000000002004e22000000000000000000000000000000000000000000000000000000000000ef360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000400000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000812ea9600000000002004e23e00000010000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20000000080000000000000000000000000000000000000000000000dc5721d900000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e228000000100"/656], 0x290) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user='access=user'}]}}) [ 218.303578][ T9023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 17:04:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xae01, &(0x7f0000000440)=""/186) 17:04:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x508d2e71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl(r2, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7be070") r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) connect$inet(r3, &(0x7f0000000280)={0x2, 0x4e22, @remote}, 0x10) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) [ 218.380384][ T9023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 218.463161][ T9023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 17:04:15 executing program 3: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000280)={0x7, @pix_mp={0x2, 0x100000000, 0x30383653, 0x0, 0xf, [{0xeee, 0x8}, {0x5, 0x8001}, {0x1ff}, {0x1, 0x80000001}, {0x3, 0x8797000000}, {0x7fff, 0x83ba}, {0xca9c, 0x7ff}, {0x8001, 0x62e}], 0x9, 0x4, 0x2, 0x1, 0x6}}) [ 218.554396][ T9023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 17:04:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="7f6d7ea72d3de6c53401abab384048fa6c202142389e89819f3970c9606b06f620f2203d81b84ad866b80374c2be2900bff9343088917a7d1f5fc8e6c0bdee0e3517bbf265653ff511ec1019133355bd8f"], 0x1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x5) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair(0xf, 0x3, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000240)={'nat\x00', 0x0, 0x3, 0x79, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f00000001c0)=""/121}, &(0x7f00000000c0)=0x78) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000040)='\x00') 17:04:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 17:04:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0xffffff31) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x10c}, 0xfe24) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x9) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') poll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0) 17:04:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000080)=""/205) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r3, &(0x7f0000000000)={0x9, @remote={[], 0x1}}, 0x12) syz_genetlink_get_family_id$tipc(0x0) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x40000800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 17:04:16 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2280, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x98, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0xc, 0x7fffffff, 0x5eeabc19}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r0, 0x10, &(0x7f0000000540)={&(0x7f0000000240)=""/122, 0x7a, r1}}, 0x10) getresuid(&(0x7f0000000100), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) vmsplice(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)="9172dbbcc040818aed837715a8d25070484bd8fd7e3bfe30a49c1276eb54b258afbfe7236159", 0x26}, {&(0x7f0000000600)="e54c67c9aac2cb5b7aa43d2e0bdf988f69652f49c470b93352e1d8f80a602e01ab1dbb46d0ce187bc95edc3d157ec50519f88bf34d43", 0x36}, {&(0x7f0000000640)="f175ac33b498", 0x6}], 0x3, 0x8) keyctl$link(0x8, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x10001) [ 218.792609][ T9048] XFS (loop3): Mounting V4 Filesystem [ 218.828352][ T9048] XFS (loop3): empty log check failed [ 218.833922][ T9048] XFS (loop3): log mount/recovery failed: error -5 17:04:16 executing program 2: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000340)={{0xa, 0x4e22, 0x0, @rand_addr="6a4d3d823ebf3e8dc911b3e1481704cb"}, {0xa, 0x4e23, 0x3, @mcast2, 0xd6}, 0x0, [0x0, 0x401, 0x859, 0x80000001, 0x3, 0x5, 0x3f, 0xfffffffffffffffc]}, 0x5c) r2 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="b6f0a53f4b41b3256c08d5c82ee5db", 0xf, 0xfffffffffffffffb) keyctl$read(0xb, r2, &(0x7f0000000580)=""/76, 0x4c) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0xde8, 0x3, 0x1, 0x5}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840)=0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10811, r0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000480)=0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000400)="6dae6e24be827c8639931b22c07c04facc271cfcac6c18034d626b920f44e1ae9e697b1be5969c505391ababe7be6fff3ba8dec23d44f48590acff3383ec0cb39d4909809ff024e4a37a5e1f7ac211964d83") [ 218.947059][ T9048] XFS (loop3): log mount failed [ 219.023356][ T9086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 219.087468][ T9086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 17:04:16 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x100, 0x0) mkdirat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x1ff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='.t\x00\x005\x91F\x00\x00\x00\x00\x00', 0x275a, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40020424}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x410, 0x70bd26, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "af3d09f2ec64a1f712f21542e4eb18b4"}, 0x11, 0x2) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000100)) 17:04:16 executing program 3: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) 17:04:16 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000080)=0x40, 0x4) r3 = socket$kcm(0xa, 0x1, 0x11) r4 = dup2(r0, r1) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000000c0)=0x1) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)=r4) setsockopt$sock_attach_bpf(r3, 0x29, 0x18, 0x0, 0x0) 17:04:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7, 0x300) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000200)={{0x7, 0x9}, {0x2, 0x5}, 0x100000001, 0x2, 0x2}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}, 0x1000}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0xc000000, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x700000000000000]}}, {0x2, 0x0, 0x0, @local}}}, 0x48) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2200) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f0000000080)=0x1) 17:04:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0xffffffffffffffff, 0xff}]}, 0xc, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x2) [ 219.528278][ T9109] XFS (loop3): Mounting V4 Filesystem 17:04:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x1) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100)=0x80000001, 0x4) tkill(r0, 0x1000000000016) getuid() socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 219.607086][ T9109] XFS (loop3): empty log check failed [ 219.614100][ T9109] XFS (loop3): log mount/recovery failed: error -5 [ 219.696781][ T9109] XFS (loop3): log mount failed 17:04:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 17:04:17 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={0x80000001}, 0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x800) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x2284, &(0x7f00000000c0)) keyctl$session_to_parent(0x12) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) 17:04:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="480000001400190d09004beafd0d8c560284ed7a80000000625ebc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000ab8b8596629d", 0x48}], 0x1) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x3c3083bc69c54fdc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x50, 0x3f}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000200)={r2, 0x100000000}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000280)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000240)=0x5, 0x4) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000040)=0x3) listen(r0, 0x8) 17:04:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0xe, 0x100000000000913, 0x400000000006, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffa}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x2, &(0x7f0000000080)=@raw=[@map={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3f000000}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x96, &(0x7f00000001c0)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) 17:04:17 executing program 3: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:17 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2280, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x98, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0xc, 0x7fffffff, 0x5eeabc19}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r0, 0x10, &(0x7f0000000540)={&(0x7f0000000240)=""/122, 0x7a, r1}}, 0x10) getresuid(&(0x7f0000000100), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) vmsplice(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)="9172dbbcc040818aed837715a8d25070484bd8fd7e3bfe30a49c1276eb54b258afbfe7236159", 0x26}, {&(0x7f0000000600)="e54c67c9aac2cb5b7aa43d2e0bdf988f69652f49c470b93352e1d8f80a602e01ab1dbb46d0ce187bc95edc3d157ec50519f88bf34d43", 0x36}, {&(0x7f0000000640)="f175ac33b498", 0x6}], 0x3, 0x8) keyctl$link(0x8, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x10001) 17:04:17 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000fe8)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x301040, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000001c0)={0x8001, {{0xa, 0x4e22, 0x2, @rand_addr="ce446a0781f817947eb7749da1004562", 0x1}}}, 0x88) r4 = dup(r2) getsockopt$inet6_tcp_int(r4, 0x6, 0x21, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, &(0x7f0000000140)) dup3(r1, r0, 0x0) ioctl$SIOCX25GSUBSCRIP(r4, 0x89e0, &(0x7f0000000040)={'gre0\x00', 0x101}) [ 220.240977][ T9168] XFS (loop3): Mounting V4 Filesystem 17:04:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000600)='/dev/uinput\x00', 0x7ff, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000680)='/proc/capi/capi20ncci\x00', 0x102, 0x0) bind(r1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/btrfs-control\x00', 0x800, 0x0) getdents64(r3, 0x0, 0xffffffffffffff2f) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r4 = fcntl$getown(r0, 0x9) perf_event_open(0x0, r4, 0x0, r1, 0x3) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x200000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x7, 0x0, 0x80, 0x10001, 0x5}, &(0x7f00000003c0)=0x14) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000440)=[0x5, 0x80000001]) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000480)={0x5, 0x0, 0xffffffffffffffff, @local, 'hsr0\x00'}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000400)={r6, 0x3}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) r7 = syz_open_dev$cec(0x0, 0x2, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$can_raw(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x1d, r8}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{0x4, 0xfffffffffffffff7, 0x4, 0x5}, 0x5, 0x3, 0x0, 0x0, "55a0bc796e6e1ab2"}, 0x10}, 0x1, 0x0, 0x0, 0x811}, 0x4000000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 220.287716][ T9168] XFS (loop3): empty log check failed [ 220.295002][ T9168] XFS (loop3): log mount/recovery failed: error -5 17:04:17 executing program 2: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) [ 220.372738][ T9168] XFS (loop3): log mount failed 17:04:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000600)='/dev/uinput\x00', 0x7ff, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000680)='/proc/capi/capi20ncci\x00', 0x102, 0x0) bind(r1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/btrfs-control\x00', 0x800, 0x0) getdents64(r3, 0x0, 0xffffffffffffff2f) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r4 = fcntl$getown(r0, 0x9) perf_event_open(0x0, r4, 0x0, r1, 0x3) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x200000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x7, 0x0, 0x80, 0x10001, 0x5}, &(0x7f00000003c0)=0x14) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000440)=[0x5, 0x80000001]) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000480)={0x5, 0x0, 0xffffffffffffffff, @local, 'hsr0\x00'}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000400)={r6, 0x3}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) r7 = syz_open_dev$cec(0x0, 0x2, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) sendmsg$can_raw(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x1d, r8}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{0x4, 0xfffffffffffffff7, 0x4, 0x5}, 0x5, 0x3, 0x0, 0x0, "55a0bc796e6e1ab2"}, 0x10}, 0x1, 0x0, 0x0, 0x811}, 0x4000000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 220.497645][ T9193] XFS (loop2): Mounting V4 Filesystem [ 220.563056][ T9193] XFS (loop2): empty log check failed 17:04:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) [ 220.618372][ T9193] XFS (loop2): log mount/recovery failed: error -5 [ 220.707043][ T9193] XFS (loop2): log mount failed 17:04:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x1) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100)=0x80000001, 0x4) tkill(r0, 0x1000000000016) getuid() socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 17:04:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000000c0)={0x800000, 0x1c87}) 17:04:18 executing program 1: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x400041000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) listen(r2, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r3 = dup(r2) accept4$inet(r3, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000014) [ 220.907980][ T9222] XFS (loop3): Mounting V4 Filesystem [ 220.942100][ T9222] XFS (loop3): empty log check failed [ 220.949636][ T9222] XFS (loop3): log mount/recovery failed: error -5 [ 221.016985][ T9222] XFS (loop3): log mount failed 17:04:18 executing program 4: ioctl(0xffffffffffffffff, 0x100000890f, &(0x7f0000000000)="11dca5055e0bcfec7be070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000200007041dfffd946f610500020003031f00030300000800080011000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x8e, 0xfffffffffffffffb, 0x4, 0x4f, 0x1, [{0x4, 0x2, 0x9b, 0x0, 0x0, 0x200}]}) socket$key(0xf, 0x3, 0x2) 17:04:18 executing program 2: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) [ 221.138521][ T9244] XFS (loop1): Mounting V4 Filesystem [ 221.210044][ T9244] XFS (loop1): empty log check failed [ 221.228560][ T9244] XFS (loop1): log mount/recovery failed: error -5 [ 221.238508][ T9260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 17:04:18 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 221.316900][ T9244] XFS (loop1): log mount failed [ 221.385371][ T9263] XFS (loop2): Mounting V4 Filesystem [ 221.445610][ T9263] XFS (loop2): empty log check failed [ 221.475986][ T9263] XFS (loop2): log mount/recovery failed: error -5 17:04:18 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 221.536796][ T9263] XFS (loop2): log mount failed 17:04:18 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x1d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) set_thread_area(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) 17:04:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="624447c8fe0000f09d"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:04:19 executing program 1: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:19 executing program 0: timer_create(0x0, 0xfffffffffffffffe, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@tipc=@name, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x6, [0x4, 0xfff, 0x5, 0x0, 0x6a73e65b, 0x800]}, &(0x7f0000000100)=0x10) 17:04:19 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:19 executing program 2: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) [ 222.026033][ T9301] XFS (loop1): Mounting V4 Filesystem 17:04:19 executing program 0: r0 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) capset(&(0x7f00002d0ff8)={0x20071026}, &(0x7f0000cc0000)={0x0, 0x0, 0x3ff}) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) 17:04:19 executing program 4: ioctl(0xffffffffffffffff, 0x100000890f, &(0x7f0000000000)="11dca5055e0bcfec7be070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000200007041dfffd946f610500020003031f00030300000800080011000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x8e, 0xfffffffffffffffb, 0x4, 0x4f, 0x1, [{0x4, 0x2, 0x9b, 0x0, 0x0, 0x200}]}) socket$key(0xf, 0x3, 0x2) [ 222.073266][ T9301] XFS (loop1): empty log check failed [ 222.083535][ T9301] XFS (loop1): log mount/recovery failed: error -5 [ 222.162947][ T9317] XFS (loop2): Mounting V4 Filesystem [ 222.206737][ T9301] XFS (loop1): log mount failed [ 222.236524][ T9337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 222.240735][ T9317] XFS (loop2): empty log check failed [ 222.256298][ T9336] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure [ 222.273281][ T9317] XFS (loop2): log mount/recovery failed: error -5 [ 222.336998][ T9317] XFS (loop2): log mount failed 17:04:19 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x5bfccbe919157c12, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x40, 0x1, 0x400, 0x0, 0x1, 0x1, [], 0x0, r0, 0x0, 0x5}, 0xfffffc8a) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80440, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100)=0x8, r3, 0x0, 0x0, 0x1}}, 0xfffffffffffffdf2) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 17:04:19 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x210, 0x0, 0x1, [{{0x3, 0x1, 0x4, 0x0, 0x1, 0x2, {0x6, 0xdd, 0x6, 0xffff, 0x6, 0xda2, 0xffffffffffffffff, 0x35, 0x3, 0x8, 0x80000001, r1, r2, 0xfffffffffffffff9, 0x1}}, {0x3, 0x7, 0x10, 0x0, ']vboxnet0}wlan1!'}}, {{0x2, 0x1, 0x7, 0x2, 0x19, 0x0, {0x2, 0x7f, 0x3, 0xd3e1, 0xd4, 0xfffffffffffffbe5, 0x1, 0x26d, 0x3ff, 0x7fff, 0x7, r3, r4, 0xfff, 0x101}}, {0x3, 0x8, 0x1, 0x791, '$'}}, {{0x0, 0x3, 0x3ff, 0x80000000, 0x1000, 0x9028, {0x6, 0x4b7, 0x6, 0x1, 0x90, 0x1, 0x10000, 0x7, 0x7f, 0x8000, 0xffffffff, r5, r6, 0x800000000, 0x7f000000}}, {0x2, 0x200, 0x1a, 0x1, 'mime_typeposix_acl_access]'}}]}, 0x210) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r8, 0xc0045516, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 0x8}) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x51) ioctl$UI_DEV_SETUP(r7, 0x5501, 0x0) 17:04:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:19 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) read$alg(r1, &(0x7f0000000140)=""/234, 0xea) 17:04:20 executing program 2: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:20 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) 17:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0xfffffffffffffffb, 0x0, "fe1b89e7187ee915b35d40311a0ff61e0c727c76246f0522e7ccd4802ef9286ee279f9b0818af990c57006b498f10a10c99f65b3b84ad1fb752fbccdfded9bafd6310d511d4ec6328fa6d3e8ea047f89"}, 0xd8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 17:04:20 executing program 1: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)={'raw\x00', 0x2, [{}, {}]}, 0x48) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x11) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) 17:04:20 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) move_pages(r1, 0x0, &(0x7f0000000400), &(0x7f0000000440)=[0x1], &(0x7f0000000480), 0x6) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x102, 0x4) 17:04:20 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x6}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 223.064484][ T9370] XFS (loop2): Mounting V4 Filesystem 17:04:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 223.114543][ T9377] XFS (loop1): Mounting V4 Filesystem [ 223.116504][ T9370] XFS (loop2): empty log check failed [ 223.139879][ T9370] XFS (loop2): log mount/recovery failed: error -5 17:04:20 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc008561c, &(0x7f00000000c0)={0x1, 0x0, {0x2, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}}) lgetxattr(&(0x7f0000000040)='\x00', &(0x7f0000000080)=@known='security.apparmor\x00', &(0x7f0000000140)=""/135, 0x87) 17:04:20 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0xfffffffffffffeff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000040)="dfb5b8581de25ed8e4887035c047e1c127103d03202ff898743d10fbbaaed70d8e86408a42a42196e6e5a847feee660641a35300ee41032a72f8ce4570c180f4cae7c961c496eec0d1e519d5f453c4353683e2776429f4e8df3c23", 0x5b, r0}, 0x68) [ 223.215619][ T9377] XFS (loop1): empty log check failed [ 223.231968][ T9377] XFS (loop1): log mount/recovery failed: error -5 [ 223.246803][ T9370] XFS (loop2): log mount failed 17:04:20 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0xb, 0x0, "6f2a140c38c5cd43a89093dc498b069de46432659b1422511d2f6bba472ac7e1f824db71c4d6f9bc05cc4e2104a663ff39310c70f67b5a4472e5aa345bead8d5", "ac837f92c879037154dd9ffca951c735ca1fca7a8a1cd64b465edcb465c76ba6", [0x0, 0x40000000000000]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) [ 223.352131][ T9421] QAT: Invalid ioctl [ 223.357227][ T9377] XFS (loop1): log mount failed [ 223.379859][ T9421] QAT: Invalid ioctl 17:04:20 executing program 2: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0x3, 0x2, 0x67, "d0c00064d51e7544eb6d3eb7cd3fe98629a88ff31716348746106279bb02e18c97947e29cc76f02d8226a74783e0d8cfcac65f4e3ee5798894df113e518c243bd9b2329c44a19405a5c1dd9878c7ffee193b58d1063f40569fbb0a206fba29cec791b2df699b4a"}, 0x71, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:21 executing program 0: r0 = socket$kcm(0xa, 0x4922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000140)=@nl=@unspec={0xfe80000000000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000080)="f400110000302c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400020300000000", 0x30}], 0x1, 0x0, 0x0, 0xfe800000}, 0x0) acct(&(0x7f00000000c0)='./file0\x00') [ 223.815250][ T9434] XFS (loop3): Invalid superblock magic number [ 223.864530][ T9446] XFS (loop2): Mounting V4 Filesystem 17:04:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0xfff, 0x7fff, 0x2, 0x0, 0x0, [{r0, 0x0, 0x8001}, {r0, 0x0, 0x6}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xe000bb8) [ 223.920210][ T9446] XFS (loop2): empty log check failed [ 223.926228][ T9462] device lo entered promiscuous mode [ 223.945431][ T9446] XFS (loop2): log mount/recovery failed: error -5 17:04:21 executing program 4: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='!??'], 0x3) fallocate(r0, 0x3, 0x0, 0x8020001) [ 224.010571][ T9463] XFS (loop1): Mounting V4 Filesystem [ 224.017418][ T9446] XFS (loop2): log mount failed [ 224.069040][ T9463] XFS (loop1): empty log check failed [ 224.080608][ T9463] XFS (loop1): log mount/recovery failed: error -5 [ 224.156865][ T9463] XFS (loop1): log mount failed 17:04:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:21 executing program 4: sysinfo(&(0x7f0000000100)=""/22) r0 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x628, 0x80) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000800)}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) io_uring_enter(r1, 0x1ff, 0x0, 0x1, &(0x7f0000000140), 0x8) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b40)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) accept(r1, &(0x7f0000000c80)=@can={0x1d, 0x0}, &(0x7f0000000d00)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000e40)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000e80)={'\x00', 0x0}) accept4$packet(r1, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002080)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004c40)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000004d40)=0xe8) accept$packet(r0, &(0x7f0000005040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005080)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000006580)={0x0, @local, @dev}, &(0x7f00000065c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000067c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006800)={'team0\x00', 0x0}) getpeername$packet(r1, &(0x7f0000006840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006880)=0x14) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f00000068c0)=@alg, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000006940)=""/4096, 0x1000}, {&(0x7f0000007940)=""/187, 0xbb}, {&(0x7f0000007a00)=""/251, 0xfb}, {&(0x7f0000007b00)}, {&(0x7f0000007b40)=""/57, 0x39}, {&(0x7f0000007b80)=""/135, 0x87}, {&(0x7f0000007c40)=""/76, 0x4c}, {&(0x7f0000007cc0)=""/104, 0x68}, {&(0x7f0000007d40)=""/120, 0x78}], 0x9, &(0x7f0000007e80)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000008e80)=@vsock, 0x80, &(0x7f0000008fc0)=[{&(0x7f0000008f00)=""/152, 0x98}], 0x1, &(0x7f0000009000)=""/221, 0xdd}, 0xa81}, {{&(0x7f0000009100)=@ethernet={0x0, @local}, 0x80, &(0x7f0000009300)=[{&(0x7f0000009180)=""/20, 0x14}, {&(0x7f00000091c0)=""/18, 0x12}, {&(0x7f0000009200)=""/47, 0x2f}, {&(0x7f0000009240)=""/163, 0xa3}], 0x4, &(0x7f0000009340)=""/105, 0x69}, 0x3}, {{0x0, 0x0, &(0x7f000000a680)=[{&(0x7f00000093c0)=""/6, 0x6}, {&(0x7f0000009400)=""/151, 0x97}, {&(0x7f00000094c0)=""/4096, 0x1000}, {&(0x7f000000a4c0)=""/125, 0x7d}, {&(0x7f000000a540)=""/50, 0x32}, {&(0x7f000000a580)=""/247, 0xf7}], 0x6, &(0x7f000000a700)=""/179, 0xb3}, 0xc7}, {{&(0x7f000000a7c0)=@caif=@rfm, 0x80, &(0x7f000000bb40)=[{&(0x7f000000a840)}, {&(0x7f000000a880)=""/227, 0xe3}, {&(0x7f000000a980)=""/146, 0x92}, {&(0x7f000000aa40)=""/4096, 0x1000}, {&(0x7f000000ba40)=""/242, 0xf2}], 0x5}, 0x200}, {{&(0x7f000000bbc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000bc40)=""/14, 0xe}, {&(0x7f000000bc80)=""/4096, 0x1000}, {&(0x7f000000cc80)=""/132, 0x84}], 0x3}, 0x9}], 0x6, 0x10000, 0x0) recvmsg$kcm(r0, &(0x7f000000ee00)={&(0x7f000000e940)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000ec80)=[{&(0x7f000000e9c0)=""/175, 0xaf}, {&(0x7f000000ea80)}, {&(0x7f000000eac0)=""/76, 0x4c}, {&(0x7f000000eb40)}, {&(0x7f000000eb80)=""/193, 0xc1}], 0x5, &(0x7f000000ed00)=""/243, 0xf3}, 0x40010020) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000ee40)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f000000ef40)=0xe8) accept$packet(r0, &(0x7f000000ef80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000efc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000f000)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f000000f100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000f140)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f000000f180)={@multicast2, @broadcast, 0x0}, &(0x7f000000f1c0)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000f900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10090000}, 0xc, &(0x7f000000f8c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="9c060000", @ANYRES16=r2, @ANYBLOB="100028bd7000fcdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="40010200400000240001006c625f74785f686173685f746f5f706f9a7d4a2572745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000700000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r6, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040001043ff80200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004002888000008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="840002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000008000100", @ANYRES32=r10, @ANYBLOB="f000020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400080000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004000400ff000100010040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="3c02020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="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", @ANYRES32=r14, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="080007000000000074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000440004000600030005000000ff010100787a00000300e3090100000004002048080000000600ff0101010000000106070002000005000009aed600000300ff05fbffffff400001002400010071756575655f696400000000000000000000000000000000000000000000000008000300030000000800040000f0ffff08000600", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="7001020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040004000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004008100000008000600", @ANYRES32=r19, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b0000000800040054ce000008000600", @ANYRES32=r21, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r22], 0x69c}, 0x1, 0x0, 0x0, 0x80}, 0x800) r23 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r24 = syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x5, 0x80952, r24, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r25 = socket$inet(0x10, 0x2, 0x0) setsockopt$inet6_mtu(r23, 0x29, 0x17, &(0x7f00000000c0)=0x5, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r24, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x5, @ipv4={[], [], @empty}, 0x80}}, 0x305c, 0x2}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r26}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r24, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) lstat(0x0, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000340), 0x4) ioctl$sock_ifreq(r25, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00', @ifru_flags}) 17:04:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0xfff, 0x7fff, 0x2, 0x0, 0x0, [{r0, 0x0, 0x8001}, {r0, 0x0, 0x6}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xe000bb8) 17:04:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 224.501996][ T9486] XFS (loop3): Invalid superblock magic number 17:04:21 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 224.658461][ T9438] device lo left promiscuous mode [ 224.769590][ T9505] device lo entered promiscuous mode 17:04:22 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x10000008002}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'eql\x00'}) dup3(r0, r2, 0x0) [ 224.814639][ T9508] XFS (loop2): Mounting V4 Filesystem [ 224.873688][ T9508] XFS (loop2): empty log check failed [ 224.887838][ T9508] XFS (loop2): log mount/recovery failed: error -5 [ 225.017128][ T9508] XFS (loop2): log mount failed 17:04:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0xfff, 0x7fff, 0x2, 0x0, 0x0, [{r0, 0x0, 0x8001}, {r0, 0x0, 0x6}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xe000bb8) 17:04:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:23 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:23 executing program 4: readv(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000002bc0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000900)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000840)=0xe8) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x44, &(0x7f0000000a00)={'trans=unix,', {[{@loose='loose'}, {@msize={'msize', 0x3d, 0x7}}, {@fscache='fscache'}, {@access_any='access=any'}], [{@fowner_gt={'fowner>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-lo-nodevem0procwlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, 'vmnet0'}}, {@appraise='appraise'}]}}) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0), 0x4000000000001e4, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 17:04:23 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 226.723601][ T9540] rdma_op 00000000c49722df conn xmit_rdma 0000000074472ac8 [ 226.728362][ T9559] rdma_op 00000000953c7340 conn xmit_rdma 0000000074472ac8 [ 226.748368][ T9558] device lo left promiscuous mode 17:04:24 executing program 4: readv(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000002bc0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000900)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000840)=0xe8) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x44, &(0x7f0000000a00)={'trans=unix,', {[{@loose='loose'}, {@msize={'msize', 0x3d, 0x7}}, {@fscache='fscache'}, {@access_any='access=any'}], [{@fowner_gt={'fowner>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-lo-nodevem0procwlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, 'vmnet0'}}, {@appraise='appraise'}]}}) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0), 0x4000000000001e4, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 17:04:24 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:24 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 226.831892][ T9545] XFS (loop3): Invalid superblock magic number 17:04:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 227.110974][ T9579] rdma_op 00000000225555d2 conn xmit_rdma 0000000074472ac8 17:04:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:24 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 227.416409][ T9588] XFS (loop3): Invalid superblock magic number 17:04:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:24 executing program 4: readv(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000002bc0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000900)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000840)=0xe8) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x44, &(0x7f0000000a00)={'trans=unix,', {[{@loose='loose'}, {@msize={'msize', 0x3d, 0x7}}, {@fscache='fscache'}, {@access_any='access=any'}], [{@fowner_gt={'fowner>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-lo-nodevem0procwlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, 'vmnet0'}}, {@appraise='appraise'}]}}) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0), 0x4000000000001e4, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 17:04:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 227.537436][ T9606] rdma_op 000000009052e8a7 conn xmit_rdma 0000000074472ac8 17:04:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:24 executing program 4: readv(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000002bc0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000900)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000840)=0xe8) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x44, &(0x7f0000000a00)={'trans=unix,', {[{@loose='loose'}, {@msize={'msize', 0x3d, 0x7}}, {@fscache='fscache'}, {@access_any='access=any'}], [{@fowner_gt={'fowner>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-lo-nodevem0procwlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, 'vmnet0'}}, {@appraise='appraise'}]}}) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0), 0x4000000000001e4, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 227.746871][ T9613] device lo entered promiscuous mode 17:04:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 227.873244][ T9629] rdma_op 000000006b737625 conn xmit_rdma 0000000074472ac8 17:04:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 228.118519][ T9637] XFS (loop3): Invalid superblock magic number 17:04:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 228.311825][ T9655] XFS (loop1): Invalid superblock magic number 17:04:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 228.866127][ T9642] device lo entered promiscuous mode 17:04:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 229.137860][ T9699] XFS (loop3): Invalid superblock magic number [ 229.153592][ T9694] XFS (loop1): Invalid superblock magic number [ 229.163034][ T9695] XFS (loop2): Invalid superblock magic number [ 229.334722][ T9667] device lo entered promiscuous mode 17:04:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 229.440376][ T9681] device lo left promiscuous mode [ 229.451698][ T9688] device lo entered promiscuous mode 17:04:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:04:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 229.780664][ T9729] XFS (loop4): Mounting V4 Filesystem [ 229.838931][ T9729] XFS (loop4): empty log check failed [ 229.851546][ T9729] XFS (loop4): log mount/recovery failed: error -5 [ 229.878442][ T9720] device lo left promiscuous mode [ 229.903039][ T9738] XFS (loop2): Invalid superblock magic number [ 229.960638][ T9729] XFS (loop4): log mount failed [ 230.094178][ T9723] device lo entered promiscuous mode [ 230.100716][ T9752] XFS (loop3): Invalid superblock magic number [ 230.107689][ T9757] XFS (loop1): Invalid superblock magic number 17:04:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 230.418195][ T9773] XFS (loop2): Invalid superblock magic number 17:04:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 230.522433][ T9778] XFS (loop4): Mounting V4 Filesystem [ 230.569731][ T9778] XFS (loop4): empty log check failed [ 230.601389][ T9778] XFS (loop4): log mount/recovery failed: error -5 [ 230.655806][ T9797] XFS (loop3): Invalid superblock magic number [ 230.677037][ T9778] XFS (loop4): log mount failed 17:04:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) [ 231.775886][ T9815] device lo left promiscuous mode [ 231.862696][ T9816] device lo entered promiscuous mode 17:04:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) 17:04:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:04:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) [ 232.159728][ T9822] device lo left promiscuous mode [ 232.224551][ T9836] device lo left promiscuous mode [ 232.261523][ T9829] XFS (loop3): Invalid superblock magic number [ 232.310159][ T9825] XFS (loop1): Invalid superblock magic number [ 232.344275][ T9824] XFS (loop4): Mounting V4 Filesystem [ 232.367669][ T9831] XFS (loop2): Invalid superblock magic number [ 232.380898][ T9824] XFS (loop4): empty log check failed [ 232.423133][ T9824] XFS (loop4): log mount/recovery failed: error -5 17:04:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) [ 232.545011][ T9862] device lo entered promiscuous mode [ 232.567111][ T9824] XFS (loop4): log mount failed 17:04:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 232.845449][ T9868] XFS (loop3): Invalid superblock magic number 17:04:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) [ 233.016267][ T9866] device lo entered promiscuous mode 17:04:30 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 233.170534][ T9882] XFS (loop1): Invalid superblock magic number 17:04:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 233.250973][ T9889] XFS (loop2): Invalid superblock magic number 17:04:30 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 233.439737][ T9914] XFS (loop3): Invalid superblock magic number [ 233.467968][ T9894] device lo left promiscuous mode 17:04:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 233.574849][ T9910] device lo entered promiscuous mode 17:04:30 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 233.979187][ T9930] device lo left promiscuous mode [ 234.032700][ T9945] XFS (loop2): Invalid superblock magic number [ 234.071670][ T9947] XFS (loop1): Invalid superblock magic number 17:04:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 234.231804][ T9957] XFS (loop3): Invalid superblock magic number 17:04:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) 17:04:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:04:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:04:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 236.171001][T10011] device lo left promiscuous mode [ 236.223171][T10005] XFS (loop2): Invalid superblock magic number [ 236.241792][T10002] XFS (loop1): Invalid superblock magic number [ 236.319800][T10001] XFS (loop4): Invalid superblock magic number 17:04:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) 17:04:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:04:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:04:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) [ 236.913972][T10044] XFS (loop2): Invalid superblock magic number [ 236.947432][T10038] XFS (loop1): Invalid superblock magic number [ 236.957412][T10043] XFS (loop3): Invalid superblock magic number [ 236.978819][T10054] XFS (loop4): Invalid superblock magic number 17:04:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:04:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:04:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 237.669691][T10098] XFS (loop3): Invalid superblock magic number [ 237.680635][T10089] XFS (loop0): Invalid superblock magic number [ 237.689623][T10096] XFS (loop2): Invalid superblock magic number [ 237.709091][T10091] XFS (loop4): Invalid superblock magic number [ 237.804246][T10127] XFS (loop1): Invalid superblock magic number 17:04:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 238.357346][T10155] device lo entered promiscuous mode [ 238.567164][T10152] XFS (loop2): Invalid superblock magic number 17:04:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 238.646575][T10168] XFS (loop1): Invalid superblock magic number [ 238.657698][T10164] XFS (loop3): Invalid superblock magic number [ 238.660895][T10165] XFS (loop4): Invalid superblock magic number 17:04:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 17:04:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 239.252265][T10201] XFS (loop2): Invalid superblock magic number [ 239.284614][T10207] XFS (loop1): Invalid superblock magic number [ 239.416104][T10218] XFS (loop3): device supports 512 byte sectors (not 0) [ 239.527209][T10233] XFS (loop4): Invalid superblock magic number 17:04:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 239.943047][T10245] XFS (loop2): Invalid superblock magic number 17:04:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 17:04:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:04:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 241.339419][T10284] device lo left promiscuous mode [ 241.408693][T10269] XFS (loop2): Invalid superblock magic number [ 241.415775][T10284] device lo entered promiscuous mode [ 241.415821][T10270] XFS (loop1): Invalid superblock magic number [ 241.432250][T10277] XFS (loop3): device supports 512 byte sectors (not 0) [ 241.473745][T10267] XFS (loop4): Invalid superblock magic number 17:04:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 17:04:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 242.049675][T10313] device lo left promiscuous mode 17:04:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 242.124237][T10311] XFS (loop3): device supports 512 byte sectors (not 0) [ 242.264049][T10313] device lo entered promiscuous mode [ 242.350866][T10331] XFS (loop1): Invalid superblock magic number [ 242.382787][T10333] XFS (loop4): Invalid superblock magic number [ 242.436070][T10345] XFS (loop2): Invalid superblock magic number 17:04:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 17:04:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 242.822004][T10360] XFS (loop3): device supports 512 byte sectors (not 0) 17:04:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 243.087302][T10378] XFS (loop2): Invalid superblock magic number [ 243.119223][T10375] XFS (loop1): Invalid superblock magic number [ 243.129500][T10379] XFS (loop4): Invalid superblock magic number [ 243.175102][T10351] device lo entered promiscuous mode 17:04:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 243.437418][T10402] device lo left promiscuous mode [ 243.445700][T10410] device lo entered promiscuous mode [ 243.467563][T10408] XFS (loop3): device supports 512 byte sectors (not 0) 17:04:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 243.783268][T10424] XFS (loop1): Invalid superblock magic number [ 243.820936][T10432] XFS (loop4): Invalid superblock magic number 17:04:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 17:04:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 17:04:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 17:04:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 245.299838][T10455] XFS (loop3): device supports 512 byte sectors (not 0) [ 245.313274][T10482] device lo left promiscuous mode [ 245.329807][T10452] XFS (loop2): device supports 512 byte sectors (not 0) [ 245.339756][T10453] XFS (loop4): Invalid superblock magic number [ 245.356508][T10456] XFS (loop1): device supports 512 byte sectors (not 0) [ 245.450358][T10482] device lo entered promiscuous mode 17:04:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 17:04:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 246.094133][T10493] XFS (loop3): SB sanity check failed [ 246.108590][T10493] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 246.165528][T10504] XFS (loop1): device supports 512 byte sectors (not 0) [ 246.188910][T10506] XFS (loop4): Invalid superblock magic number [ 246.192352][T10493] XFS (loop3): Unmount and run xfs_repair 17:04:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 246.231610][T10493] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 246.243982][T10493] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 246.267420][T10493] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 246.334936][T10493] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 246.367748][T10531] device lo left promiscuous mode [ 246.368869][T10493] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:04:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 246.398463][T10523] XFS (loop2): device supports 512 byte sectors (not 0) [ 246.424948][T10493] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 246.445928][T10493] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 246.504797][T10493] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 246.534037][T10493] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 246.554459][T10493] XFS (loop3): SB validate failed with error -117. 17:04:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:04:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 17:04:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 246.826129][T10537] XFS (loop0): Invalid superblock magic number [ 246.857884][T10544] XFS (loop4): Invalid superblock magic number 17:04:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 247.138320][T10563] XFS (loop1): device supports 512 byte sectors (not 0) [ 247.172342][T10564] XFS (loop2): device supports 512 byte sectors (not 0) 17:04:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 247.379681][ T17] XFS (loop3): SB sanity check failed [ 247.385268][ T17] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:04:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 247.482803][ T17] XFS (loop3): Unmount and run xfs_repair [ 247.515692][ T17] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 247.529207][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 247.546061][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 247.547581][T10600] device lo left promiscuous mode [ 247.562874][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 247.573585][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 247.589887][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 247.602538][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 247.615280][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 247.632259][ T17] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 247.653869][T10584] XFS (loop3): SB validate failed with error -117. 17:04:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 17:04:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 17:04:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 247.921649][T10597] XFS (loop4): Invalid superblock magic number 17:04:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 248.185866][T10615] XFS (loop1): device supports 512 byte sectors (not 0) [ 248.293788][T10623] XFS (loop2): device supports 512 byte sectors (not 0) 17:04:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 248.604462][T10637] XFS (loop3): SB sanity check failed [ 248.621699][T10637] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 248.688143][T10637] XFS (loop3): Unmount and run xfs_repair [ 248.704520][T10637] XFS (loop3): First 128 bytes of corrupted metadata buffer: 17:04:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 248.737030][T10637] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:04:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 248.793149][T10637] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 248.848282][T10637] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 248.893584][T10657] XFS (loop1): device supports 512 byte sectors (not 0) [ 248.964279][T10652] XFS (loop4): Invalid superblock magic number [ 249.013321][T10637] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 249.057948][T10637] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:04:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 249.145519][T10675] XFS (loop2): device supports 512 byte sectors (not 0) [ 249.166641][T10637] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 249.175529][T10637] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 249.256753][T10637] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 249.288747][T10637] XFS (loop3): SB validate failed with error -117. 17:04:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 17:04:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:04:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 249.719993][T10695] XFS (loop1): device supports 512 byte sectors (not 0) 17:04:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:04:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 249.904324][T10708] XFS (loop4): Invalid superblock magic number [ 250.051150][T10711] XFS (loop2): device supports 512 byte sectors (not 0) [ 250.185793][T10734] XFS (loop3): SB sanity check failed [ 250.218239][T10734] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 250.218647][T10728] XFS (loop0): SB sanity check failed 17:04:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 250.246772][T10734] XFS (loop3): Unmount and run xfs_repair [ 250.276285][T10734] XFS (loop3): First 128 bytes of corrupted metadata buffer: 17:04:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 250.372915][T10734] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 250.382285][T10728] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 250.430215][T10734] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:04:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 250.525975][T10728] XFS (loop0): Unmount and run xfs_repair [ 250.574897][ T2995] XFS (loop1): SB sanity check failed [ 250.586380][ T2995] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 250.596789][T10728] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 250.607003][T10734] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 250.616303][T10728] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 250.635212][T10734] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 250.652407][T10728] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 250.670994][ T2995] XFS (loop1): Unmount and run xfs_repair [ 250.675930][T10734] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 250.689499][T10734] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 250.700824][T10728] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 250.715676][T10734] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 250.724068][ T2995] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 250.726373][T10728] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 250.747499][T10734] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 250.766547][T10728] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 250.776044][T10734] XFS (loop3): SB validate failed with error -117. [ 250.781756][ T2995] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 250.797488][T10728] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 250.834075][T10728] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 250.926801][ T2995] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 250.934019][T10728] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 250.980204][T10728] XFS (loop0): SB validate failed with error -117. [ 251.030349][ T2995] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 251.106629][ T2995] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 251.115720][ T2995] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 251.125614][T10770] XFS (loop2): SB sanity check failed [ 251.136638][ T2995] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 251.136900][T10770] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 251.145608][ T2995] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 251.145620][ T2995] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 251.146000][T10751] XFS (loop1): SB validate failed with error -117. 17:04:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 251.199777][T10763] XFS (loop4): device supports 512 byte sectors (not 0) [ 251.207107][T10770] XFS (loop2): Unmount and run xfs_repair [ 251.212845][T10770] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 251.235651][T10770] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 251.314271][T10770] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 251.336995][T10770] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 251.345875][T10770] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:04:48 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 251.521044][T10770] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 251.533724][T10770] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 251.546384][T10770] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:04:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 17:04:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 251.630887][T10770] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 251.664820][T10770] XFS (loop2): SB validate failed with error -117. 17:04:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 251.733644][T10791] XFS (loop3): SB sanity check failed [ 251.747894][T10791] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 251.790878][T10791] XFS (loop3): Unmount and run xfs_repair [ 251.808708][T10791] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 251.839479][T10791] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 251.854040][T10791] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 251.864155][T10791] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 251.873957][T10791] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 251.894211][T10791] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 251.903749][T10791] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 251.915676][T10791] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 251.944964][T10791] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 251.956803][T10791] XFS (loop3): SB validate failed with error -117. [ 251.973707][ T2995] XFS (loop0): SB sanity check failed [ 252.061070][ T2995] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 252.163877][ T2995] XFS (loop0): Unmount and run xfs_repair [ 252.195703][ T17] XFS (loop1): SB sanity check failed [ 252.204807][ T17] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 252.219699][ T2995] XFS (loop0): First 128 bytes of corrupted metadata buffer: 17:04:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 252.265853][ T2995] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 252.294234][ T2995] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 252.315737][ T17] XFS (loop1): Unmount and run xfs_repair [ 252.342138][ T17] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 252.344440][ T2995] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 252.379348][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 252.383608][ T2995] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 252.414765][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 252.452620][ T2995] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 252.491415][ T2995] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 252.510704][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 252.518399][ T2995] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 252.573733][ T2995] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 252.610046][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 252.615097][T10802] XFS (loop0): SB validate failed with error -117. [ 252.708728][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 252.746751][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:04:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 17:04:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 252.755637][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 252.765652][ T17] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 252.774710][T10809] XFS (loop1): SB validate failed with error -117. [ 252.775310][T10819] XFS (loop4): device supports 512 byte sectors (not 0) [ 252.930637][T10840] XFS (loop2): SB sanity check failed [ 252.936257][T10840] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 252.977580][T10844] XFS (loop3): SB sanity check failed [ 253.021110][T10844] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 253.074314][T10840] XFS (loop2): Unmount and run xfs_repair [ 253.093681][T10844] XFS (loop3): Unmount and run xfs_repair [ 253.107447][T10840] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 253.122173][T10844] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 253.159299][T10840] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 253.172916][T10844] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 253.193479][T10840] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:04:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 253.210513][T10844] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 253.219681][T10840] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 17:04:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 253.286951][T10844] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 253.295836][T10844] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 253.327081][T10840] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 253.386824][T10840] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 253.417126][T10844] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:04:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 253.467443][T10844] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 253.476887][T10840] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 253.558600][T10844] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 253.558615][T10844] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 253.558650][T10844] XFS (loop3): SB validate failed with error -117. [ 253.647671][T10870] XFS (loop1): SB sanity check failed [ 253.653177][T10840] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 253.664592][T10870] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 253.695455][T10877] XFS (loop4): device supports 512 byte sectors (not 0) 17:04:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 253.754949][T10870] XFS (loop1): Unmount and run xfs_repair [ 253.780018][T10870] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 253.822435][T10870] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 253.855260][T10840] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 253.884785][T10870] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 253.987166][T10870] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 254.011434][T10870] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 254.030120][T10840] XFS (loop2): SB validate failed with error -117. [ 254.030714][T10870] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 254.059966][T10870] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 254.139053][T10870] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:04:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 254.213559][T10870] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:04:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:04:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 254.257423][T10870] XFS (loop1): SB validate failed with error -117. 17:04:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 17:04:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 254.556232][T10908] XFS (loop3): SB sanity check failed [ 254.565644][T10908] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 254.626358][T10903] XFS (loop4): device supports 512 byte sectors (not 0) [ 254.657801][T10908] XFS (loop3): Unmount and run xfs_repair [ 254.663795][T10908] XFS (loop3): First 128 bytes of corrupted metadata buffer: 17:04:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 254.705352][T10908] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 254.788999][T10927] XFS (loop2): SB sanity check failed [ 254.794694][T10927] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:04:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 254.896711][T10908] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 254.905758][T10927] XFS (loop2): Unmount and run xfs_repair [ 254.911685][T10927] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 254.919384][T10908] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 254.941586][T10908] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 254.952918][T10927] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 255.077346][T10908] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 255.086663][T10927] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 255.110271][T10908] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 255.153612][T10927] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 255.173986][T10908] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:04:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 255.215819][T10941] XFS (loop1): SB sanity check failed [ 255.256708][T10941] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 255.287046][T10927] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 255.298833][T10908] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 255.317296][T10927] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 255.336842][T10908] XFS (loop3): SB validate failed with error -117. 17:04:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 255.360048][T10941] XFS (loop1): Unmount and run xfs_repair [ 255.382627][T10927] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 255.401385][T10941] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 255.424773][T10927] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 255.467740][T10941] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 255.512855][T10927] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 255.546788][T10941] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 255.573340][T10927] XFS (loop2): SB validate failed with error -117. [ 255.652510][T10941] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 255.678200][T10956] XFS (loop4): device supports 512 byte sectors (not 0) 17:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 255.697474][T10941] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:04:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 255.750873][T10941] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 255.833705][T10941] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 255.938502][T10941] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:04:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:04:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 255.985744][T10941] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 256.025303][T10941] XFS (loop1): SB validate failed with error -117. 17:04:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 256.222537][T10971] XFS (loop3): SB sanity check failed [ 256.229479][T10971] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:04:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 256.312162][T10971] XFS (loop3): Unmount and run xfs_repair [ 256.372508][T10971] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 256.392087][T10981] XFS (loop2): SB sanity check failed 17:04:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 256.422873][T10981] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 256.445791][T10971] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 256.496937][T10981] XFS (loop2): Unmount and run xfs_repair [ 256.502880][T10981] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 256.523784][T10971] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 256.562514][T10981] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 256.578619][T10971] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 256.616220][T10991] XFS (loop4): device supports 512 byte sectors (not 0) [ 256.645780][T10981] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 256.664585][T10971] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 256.692658][T10981] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 256.720749][T10971] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 256.754255][T10981] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:04:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 256.787349][T10971] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 256.805089][T10981] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 256.872195][T11007] XFS (loop1): SB sanity check failed [ 256.885641][T10971] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 256.894805][T10981] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 256.903918][T10971] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 256.913274][T10981] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 256.926343][T10971] XFS (loop3): SB validate failed with error -117. [ 256.933864][T10981] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 256.936892][T11007] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 256.994474][T11007] XFS (loop1): Unmount and run xfs_repair [ 257.022102][T11007] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 257.029857][T10981] XFS (loop2): SB validate failed with error -117. 17:04:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 257.100406][T11007] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 257.138611][T11007] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 257.152491][T11007] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 257.216800][T11007] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 257.233534][T11007] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:04:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 257.329526][T11007] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:04:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:04:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 257.386840][T11007] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 257.497021][T11007] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:04:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 257.543324][T11007] XFS (loop1): SB validate failed with error -117. [ 257.690258][T11025] XFS (loop4): SB sanity check failed [ 257.695758][T11025] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:04:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 257.746874][T11025] XFS (loop4): Unmount and run xfs_repair [ 257.753015][T11025] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 257.815236][T11025] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 257.904265][T11025] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 257.913742][T11037] XFS (loop3): SB sanity check failed [ 257.937311][T11037] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 257.956934][T11037] XFS (loop3): Unmount and run xfs_repair [ 257.962946][T11037] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 257.967034][T11025] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 257.990956][T11047] XFS (loop2): SB sanity check failed [ 258.001165][T11037] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:04:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 258.027848][T11047] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 258.039852][T11025] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:04:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 258.080280][T11037] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 258.086751][T11025] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 258.144407][T11037] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 258.176736][T11025] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 258.176825][T11047] XFS (loop2): Unmount and run xfs_repair [ 258.190337][T11037] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 258.247358][T11047] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 258.267181][T11047] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 258.276321][T11037] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 258.319416][T11025] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 258.334114][T11037] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 258.343554][T11047] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 258.362583][T11025] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 258.378098][T11037] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 258.387492][T11047] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 258.424860][T11047] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 258.433721][T11025] XFS (loop4): SB validate failed with error -117. [ 258.437046][T11037] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 258.498633][T11047] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 258.523531][T11067] XFS (loop1): SB sanity check failed [ 258.534010][T11037] XFS (loop3): SB validate failed with error -117. 17:04:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 258.549428][T11067] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 258.562962][T11047] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 258.665059][T11067] XFS (loop1): Unmount and run xfs_repair [ 258.699069][T11047] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 258.714849][T11067] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 258.767369][T11067] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 258.778572][T11047] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:04:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 258.819898][T11067] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 258.829365][T11047] XFS (loop2): SB validate failed with error -117. [ 258.846735][T11067] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 258.882521][T11067] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 258.905804][T11067] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:04:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 258.951010][T11067] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:04:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 259.032829][T11083] device lo entered promiscuous mode [ 259.109350][T11067] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 259.132352][T11067] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:04:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 259.176784][T11067] XFS (loop1): SB validate failed with error -117. 17:04:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 259.432903][T11094] XFS (loop3): SB sanity check failed [ 259.434975][T11091] XFS (loop4): SB sanity check failed [ 259.445961][T11094] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 259.490450][T11091] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 259.520500][T11094] XFS (loop3): Unmount and run xfs_repair [ 259.526902][T11091] XFS (loop4): Unmount and run xfs_repair [ 259.546047][T11091] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 259.578794][T11094] XFS (loop3): First 128 bytes of corrupted metadata buffer: 17:04:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 259.614930][T11091] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 259.669228][T11094] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 259.724717][T11091] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 259.750338][T11094] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 259.756909][T11109] XFS (loop2): SB sanity check failed [ 259.765592][T11109] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 259.777690][T11091] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 259.833880][T11091] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 259.846753][T11094] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 259.860620][T11109] XFS (loop2): Unmount and run xfs_repair [ 259.868357][T11094] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 259.879505][T11109] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 259.887767][T11094] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 259.897347][T11091] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 259.906414][T11109] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 259.916029][T11094] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:04:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 259.928618][T11109] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 259.932760][T11091] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 259.937731][T11094] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 259.957813][T11109] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 259.967016][ T17] XFS (loop1): SB sanity check failed [ 259.969771][T11091] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:04:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 259.972789][ T17] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 259.993820][T11109] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 260.003245][T11094] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 260.006815][T11109] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 260.012328][ T17] XFS (loop1): Unmount and run xfs_repair [ 260.027055][T11094] XFS (loop3): SB validate failed with error -117. [ 260.033859][ T17] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 260.044328][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 260.089301][T11109] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 260.092897][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 260.110096][T11091] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 260.162988][T11109] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 260.190555][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 260.195684][T11091] XFS (loop4): SB validate failed with error -117. [ 260.202458][T11135] device lo left promiscuous mode [ 260.219917][T11109] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 260.262701][T11109] XFS (loop2): SB validate failed with error -117. [ 260.282478][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 260.396736][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:04:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 260.486461][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:04:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 260.539467][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 260.558695][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 260.573238][T11120] XFS (loop1): SB validate failed with error -117. 17:04:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:04:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 260.997938][ T12] XFS (loop4): SB sanity check failed [ 261.005212][ T12] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:04:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 261.052021][ T17] XFS (loop3): SB sanity check failed [ 261.058885][ T17] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 261.116702][ T17] XFS (loop3): Unmount and run xfs_repair [ 261.137999][ T12] XFS (loop4): Unmount and run xfs_repair [ 261.177885][ T12] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 261.179200][ T17] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 261.227309][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 261.272696][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 261.286257][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 261.300995][T11167] XFS (loop2): SB sanity check failed [ 261.303779][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 261.316192][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 261.323280][T11167] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 261.330102][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 261.352604][T11167] XFS (loop2): Unmount and run xfs_repair [ 261.359426][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 261.374476][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 261.385824][T11167] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 261.416224][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 261.426529][T11177] XFS (loop1): SB sanity check failed [ 261.432263][T11177] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 261.437785][T11167] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 261.445404][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 261.469351][ T12] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 261.502908][T11150] XFS (loop4): SB validate failed with error -117. [ 261.524161][T11167] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 261.537911][T11167] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 261.552559][T11177] XFS (loop1): Unmount and run xfs_repair [ 261.560841][T11177] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 261.569869][T11167] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 261.588019][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 261.589722][T11177] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 261.611841][T11167] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 261.621350][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 261.668461][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 261.680251][T11177] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 261.726779][T11167] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 261.736074][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 261.753742][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 261.769964][T11152] XFS (loop3): SB validate failed with error -117. 17:04:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:04:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 261.771104][T11177] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 261.785578][T11167] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 261.794879][T11177] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 261.812039][T11167] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 261.864158][T11167] XFS (loop2): SB validate failed with error -117. 17:04:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 261.916744][T11177] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 262.045522][T11177] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:04:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 262.086083][T11177] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 262.095241][T11177] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 262.104298][T11177] XFS (loop1): SB validate failed with error -117. 17:04:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 262.258725][T11201] XFS (loop4): SB sanity check failed [ 262.264329][T11201] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:04:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 262.333801][T11201] XFS (loop4): Unmount and run xfs_repair [ 262.342673][T11201] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 262.350408][T11201] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 262.359576][T11201] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 262.368902][T11201] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 17:04:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 262.378063][T11201] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 262.387254][T11201] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 262.398811][T11201] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 262.407991][T11201] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 262.417115][T11201] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 262.425996][T11201] XFS (loop4): SB validate failed with error -117. 17:04:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 262.653205][ T12] XFS (loop3): SB sanity check failed [ 262.663708][ T12] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 262.740663][ T17] XFS (loop2): SB sanity check failed [ 262.746731][ T17] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 262.761188][ T12] XFS (loop3): Unmount and run xfs_repair [ 262.839649][ T12] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 262.858562][ T17] XFS (loop2): Unmount and run xfs_repair [ 262.875698][ T17] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 262.883573][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 262.889611][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 262.901438][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 262.901458][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 262.901468][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 262.916343][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 262.919525][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 262.934138][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 262.937336][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 262.946244][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 262.955157][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:05:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 262.969525][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 262.973233][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 262.983814][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 262.996107][T11215] XFS (loop3): SB validate failed with error -117. [ 262.999679][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 262.999691][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 263.000063][T11221] XFS (loop2): SB validate failed with error -117. 17:05:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 263.311038][T11241] XFS (loop1): SB sanity check failed [ 263.341484][T11241] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 263.378075][T11241] XFS (loop1): Unmount and run xfs_repair [ 263.384012][T11241] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 263.443364][T11241] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:05:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:05:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 263.580935][T11241] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 263.684263][T11255] XFS (loop4): SB sanity check failed [ 263.717090][T11255] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 263.729141][T11241] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 263.746729][T11241] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 263.763067][T11255] XFS (loop4): Unmount and run xfs_repair [ 263.769351][T11241] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 263.784788][T11255] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 263.792383][T11241] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 263.806966][T11255] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 263.815971][T11241] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 263.863620][T11255] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 263.908066][T11255] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 263.954729][T11266] XFS (loop0): SB sanity check failed [ 263.978788][T11241] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 263.980526][T11266] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 264.024438][T11255] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 264.040012][ T17] XFS (loop2): SB sanity check failed [ 264.054800][ T17] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 264.090275][T11267] device lo entered promiscuous mode [ 264.118458][T11241] XFS (loop1): SB validate failed with error -117. [ 264.121034][T11255] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 264.136898][T11266] XFS (loop0): Unmount and run xfs_repair [ 264.142856][T11266] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 264.152025][ T17] XFS (loop2): Unmount and run xfs_repair [ 264.204387][T11266] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 264.213703][T11255] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 264.224446][ T17] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 264.272244][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 264.280698][T11266] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 264.292891][T11255] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 264.350412][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 264.380459][T11266] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 264.414633][T11255] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 264.434296][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 264.453178][T11266] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 264.490606][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 264.491531][T11255] XFS (loop4): SB validate failed with error -117. [ 264.513202][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 264.552594][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 264.552976][T11266] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 264.563292][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 264.636197][T11266] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 264.651471][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 264.675351][T11275] XFS (loop2): SB validate failed with error -117. 17:05:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 264.676060][T11266] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 264.711068][T11266] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 264.723584][T11266] XFS (loop0): SB validate failed with error -117. 17:05:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 264.864902][T11299] XFS (loop1): SB sanity check failed [ 264.896754][T11299] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 264.953306][T11299] XFS (loop1): Unmount and run xfs_repair [ 264.976263][T11299] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 265.015636][T11299] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 265.030759][T11299] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:05:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 265.065001][T11299] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 265.074686][T11299] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 265.085464][T11299] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 265.131298][T11299] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 265.164219][T11299] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 265.226763][T11299] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 265.253408][T11299] XFS (loop1): SB validate failed with error -117. [ 265.273734][T11313] XFS (loop4): SB sanity check failed [ 265.284459][T11313] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 265.357543][T11313] XFS (loop4): Unmount and run xfs_repair [ 265.367501][T11313] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 265.390101][T11313] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 265.430819][ T12] XFS (loop2): SB sanity check failed [ 265.437602][T11313] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 265.451012][ T12] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 265.458589][T11313] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 265.466040][ T12] XFS (loop2): Unmount and run xfs_repair [ 265.480892][ T12] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 265.488966][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 265.498871][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 265.509892][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 265.519323][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 265.528629][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 265.546757][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 265.556051][T11313] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 265.557825][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 265.574529][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 265.583921][T11328] XFS (loop2): SB validate failed with error -117. [ 265.584997][T11313] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 265.599993][T11313] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 265.609540][T11313] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 265.618920][T11313] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:05:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 265.628275][T11313] XFS (loop4): SB validate failed with error -117. [ 265.631299][T11320] XFS (loop0): SB sanity check failed [ 265.657524][T11320] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 265.708753][T11320] XFS (loop0): Unmount and run xfs_repair [ 265.726786][T11320] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 265.757554][T11320] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 265.811531][T11320] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 265.893064][T11320] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 17:05:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 265.967076][T11320] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:05:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 266.026948][T11320] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 266.115978][ T17] XFS (loop1): SB sanity check failed [ 266.138575][ T17] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 266.166299][T11320] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 266.218445][ T17] XFS (loop1): Unmount and run xfs_repair [ 266.228517][T11357] XFS (loop4): SB sanity check failed [ 266.234133][T11357] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 266.240641][ T17] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 266.275530][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 266.315173][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 266.346741][T11357] XFS (loop4): Unmount and run xfs_repair [ 266.363478][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 266.370214][T11320] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 266.417690][T11357] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 266.447263][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 266.467858][T11369] XFS (loop2): SB sanity check failed [ 266.492325][T11357] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 266.494742][T11369] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 266.505213][T11320] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 266.522336][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 266.571757][T11357] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 266.578032][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 266.589506][T11357] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 266.609430][T11320] XFS (loop0): SB validate failed with error -117. [ 266.627341][T11357] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 266.646336][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 266.654223][T11357] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 266.659246][T11369] XFS (loop2): Unmount and run xfs_repair [ 266.704716][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 266.707965][T11357] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 266.724115][T11357] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 266.726257][T11369] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 266.752259][T11345] XFS (loop1): SB validate failed with error -117. [ 266.799174][T11369] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 266.799541][T11357] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 17:05:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 266.847102][T11369] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 266.896041][T11357] XFS (loop4): SB validate failed with error -117. [ 266.898435][T11369] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 266.932305][T11369] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 266.964868][T11369] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 267.033386][T11388] device lo left promiscuous mode [ 267.059814][T11369] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:05:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 267.276825][T11369] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 267.306795][T11369] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ 17:05:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 267.326120][T11369] XFS (loop2): SB validate failed with error -117. [ 267.404774][T11392] XFS (loop0): SB sanity check failed [ 267.410797][T11392] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 267.556913][T11392] XFS (loop0): Unmount and run xfs_repair [ 267.649593][T11392] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 267.667829][T11392] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 267.686147][T11392] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:05:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 267.761107][T11407] XFS (loop4): SB sanity check failed [ 267.785170][T11407] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 267.812298][T11392] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 267.839393][ T12] XFS (loop1): SB sanity check failed [ 267.845425][ T12] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 267.874064][T11392] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 267.898395][T11407] XFS (loop4): Unmount and run xfs_repair [ 267.941599][ T12] XFS (loop1): Unmount and run xfs_repair [ 267.957581][T11407] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 267.973142][ T12] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 267.985922][T11392] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 268.004315][T11407] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 268.022184][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 268.040572][T11392] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 268.055513][T11407] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 268.071660][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 268.084441][T11392] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 268.095975][T11407] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 268.109563][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 268.123814][T11392] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 268.153705][T11407] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 268.183507][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 268.269610][T11407] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 268.295543][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 268.303014][T11392] XFS (loop0): SB validate failed with error -117. [ 268.342529][ T17] XFS (loop2): SB sanity check failed [ 268.350515][ T17] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 268.376432][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 268.404514][T11407] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 268.435842][T11407] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 268.451327][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 268.464537][ T17] XFS (loop2): Unmount and run xfs_repair [ 268.490995][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 268.491031][T11407] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 268.509761][ T17] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 268.517869][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 268.529425][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 268.542314][T11408] XFS (loop1): SB validate failed with error -117. 17:05:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 268.550587][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 268.563218][T11407] XFS (loop4): SB validate failed with error -117. [ 268.570402][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 268.582303][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 268.591833][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 268.643277][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 268.681358][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 268.725909][T11430] XFS (loop2): SB validate failed with error -117. 17:05:06 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:05:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 269.364803][T11455] XFS (loop4): SB sanity check failed [ 269.376854][T11455] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 269.453492][T11458] XFS (loop1): SB sanity check failed [ 269.488374][T11455] XFS (loop4): Unmount and run xfs_repair 17:05:06 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 269.543183][T11458] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 269.571336][T11455] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 269.593511][T11455] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:05:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 269.657962][T11455] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 269.752240][T11458] XFS (loop1): Unmount and run xfs_repair [ 269.769920][T11455] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 269.810389][T11491] device lo entered promiscuous mode [ 269.824602][T11455] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 269.847180][T11458] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 269.854611][T11458] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 269.893122][T11455] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:07 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 269.976820][T11455] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 270.030652][T11455] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 270.045609][T11458] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 270.066898][T11455] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 270.081864][T11458] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 270.115086][T11455] XFS (loop4): SB validate failed with error -117. [ 270.145922][T11458] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 270.199871][T11458] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 270.242890][T11458] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 270.274026][T11458] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 270.290733][T11458] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 270.305271][T11458] XFS (loop1): SB validate failed with error -117. 17:05:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 270.758912][T11522] device lo entered promiscuous mode [ 270.860894][T11536] XFS (loop1): SB sanity check failed [ 270.896326][ T17] XFS (loop4): SB sanity check failed [ 270.908216][ T17] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 270.921275][T11536] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 270.992216][ T17] XFS (loop4): Unmount and run xfs_repair [ 271.005356][T11536] XFS (loop1): Unmount and run xfs_repair [ 271.026691][ T17] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 271.039948][T11536] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 271.060258][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 271.075215][T11536] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 271.093387][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 271.107090][T11536] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 271.122934][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 271.136669][T11536] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 271.157898][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 271.172788][T11536] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 271.210287][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 271.236996][T11536] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 271.258416][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 271.281641][T11536] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 271.297228][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 271.326703][T11536] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 271.333683][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 271.387240][T11531] XFS (loop4): SB validate failed with error -117. [ 271.393314][T11536] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 271.427144][T11536] XFS (loop1): SB validate failed with error -117. 17:05:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 272.498811][T11572] device lo left promiscuous mode [ 272.536871][T11579] device lo left promiscuous mode [ 272.579475][T11584] XFS (loop0): Invalid superblock magic number [ 272.638510][T11576] XFS (loop1): SB sanity check failed [ 272.644065][T11577] XFS (loop4): SB sanity check failed [ 272.649641][T11576] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 272.661620][T11577] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 272.712966][T11577] XFS (loop4): Unmount and run xfs_repair [ 272.719445][T11576] XFS (loop1): Unmount and run xfs_repair [ 272.746794][T11576] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 272.754326][T11577] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 272.766411][T11572] device lo entered promiscuous mode [ 272.774207][T11576] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 272.786730][T11577] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 272.803107][T11576] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 272.812128][T11577] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 272.828144][T11576] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 272.842411][T11577] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 272.873463][T11576] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 272.884892][T11577] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 272.957588][T11576] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 272.978035][T11577] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 273.033382][T11576] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 273.042492][T11577] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:05:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 273.110197][T11576] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 273.120452][T11577] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 273.167167][T11576] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 273.176749][T11577] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ 17:05:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 273.210461][T11576] XFS (loop1): SB validate failed with error -117. [ 273.233676][T11577] XFS (loop4): SB validate failed with error -117. [ 273.327616][T11607] XFS (loop0): Invalid superblock magic number 17:05:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 17:05:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:11 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 273.887755][T11637] device lo left promiscuous mode [ 274.000334][ T8747] XFS (loop4): SB sanity check failed [ 274.009427][ T8747] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 274.057990][ T8747] XFS (loop4): Unmount and run xfs_repair [ 274.070565][ T8747] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 274.121077][ T8747] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 274.153426][ T8747] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 274.227412][T11637] device lo entered promiscuous mode [ 274.228802][ T8747] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 274.263911][T11650] XFS (loop0): Invalid superblock magic number [ 274.365377][ T8747] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:05:11 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 274.456330][ T8747] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 274.533010][ T8747] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 274.567139][ T8747] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 274.581843][ T8747] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ 17:05:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 274.642749][T11629] XFS (loop4): SB validate failed with error -117. 17:05:12 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 274.911423][T11682] XFS (loop0): Invalid superblock magic number 17:05:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:05:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) [ 275.138870][T11697] XFS (loop2): Invalid superblock magic number [ 275.203483][T11711] device lo left promiscuous mode 17:05:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:05:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 275.510333][T11718] XFS (loop3): Invalid superblock magic number [ 275.539719][T11714] device lo entered promiscuous mode 17:05:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) [ 275.694299][T11729] XFS (loop0): Invalid superblock magic number 17:05:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) 17:05:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 276.373187][T11769] XFS (loop0): Invalid superblock magic number [ 276.440418][T11770] XFS (loop1): Invalid superblock magic number [ 276.444966][T11748] device lo entered promiscuous mode 17:05:13 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 276.604159][T11789] FAULT_INJECTION: forcing a failure. [ 276.604159][T11789] name failslab, interval 1, probability 0, space 0, times 1 [ 276.620988][T11789] CPU: 0 PID: 11789 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190628 #25 [ 276.630123][T11789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.640182][T11789] Call Trace: [ 276.643561][T11789] dump_stack+0x172/0x1f0 [ 276.647907][T11789] should_fail.cold+0xa/0x15 [ 276.652512][T11789] ? fault_create_debugfs_attr+0x180/0x180 [ 276.658329][T11789] ? ___might_sleep+0x163/0x280 [ 276.663189][T11789] __should_failslab+0x121/0x190 [ 276.668141][T11789] should_failslab+0x9/0x14 [ 276.672645][T11789] __kmalloc+0x2e0/0x770 [ 276.676893][T11789] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 276.683136][T11789] ? fput_many+0x12c/0x1a0 [ 276.687555][T11789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.693799][T11789] ? strnlen_user+0x1ed/0x2e0 [ 276.698479][T11789] ? __x64_sys_memfd_create+0x13c/0x470 [ 276.704033][T11789] __x64_sys_memfd_create+0x13c/0x470 [ 276.709411][T11789] ? memfd_fcntl+0x18c0/0x18c0 [ 276.714176][T11789] ? do_syscall_64+0x26/0x6a0 [ 276.718860][T11789] ? lockdep_hardirqs_on+0x418/0x5d0 [ 276.724145][T11789] ? trace_hardirqs_on+0x67/0x240 [ 276.729173][T11789] do_syscall_64+0xfd/0x6a0 [ 276.733752][T11789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.739647][T11789] RIP: 0033:0x459519 [ 276.743542][T11789] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.763148][T11789] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 276.771560][T11789] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 276.779796][T11789] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 276.787769][T11789] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 276.795829][T11789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1eebcc06d4 17:05:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:14 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 276.803805][T11789] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:05:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) [ 276.976884][T11794] FAULT_INJECTION: forcing a failure. [ 276.976884][T11794] name failslab, interval 1, probability 0, space 0, times 0 [ 277.032481][T11794] CPU: 1 PID: 11794 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190628 #25 [ 277.041628][T11794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.051698][T11794] Call Trace: [ 277.055005][T11794] dump_stack+0x172/0x1f0 [ 277.059354][T11794] should_fail.cold+0xa/0x15 [ 277.063973][T11794] ? fault_create_debugfs_attr+0x180/0x180 [ 277.069805][T11794] ? ___might_sleep+0x163/0x280 [ 277.074682][T11794] __should_failslab+0x121/0x190 [ 277.079651][T11794] ? shmem_destroy_inode+0x80/0x80 [ 277.084778][T11794] should_failslab+0x9/0x14 [ 277.089291][T11794] kmem_cache_alloc+0x2aa/0x710 [ 277.094245][T11794] ? __alloc_fd+0x487/0x620 [ 277.098763][T11794] ? shmem_destroy_inode+0x80/0x80 [ 277.103884][T11794] shmem_alloc_inode+0x1c/0x50 [ 277.108659][T11794] alloc_inode+0x68/0x1e0 [ 277.113086][T11794] new_inode_pseudo+0x19/0xf0 [ 277.117763][T11794] new_inode+0x1f/0x40 [ 277.121814][T11794] shmem_get_inode+0x84/0x7e0 [ 277.126493][T11794] __shmem_file_setup.part.0+0x7e/0x2b0 [ 277.132050][T11794] shmem_file_setup+0x66/0x90 [ 277.136734][T11794] __x64_sys_memfd_create+0x2a2/0x470 [ 277.142104][T11794] ? memfd_fcntl+0x18c0/0x18c0 [ 277.142122][T11794] ? do_syscall_64+0x26/0x6a0 [ 277.142141][T11794] ? lockdep_hardirqs_on+0x418/0x5d0 [ 277.142159][T11794] ? trace_hardirqs_on+0x67/0x240 [ 277.142179][T11794] do_syscall_64+0xfd/0x6a0 [ 277.142198][T11794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.151704][T11794] RIP: 0033:0x459519 [ 277.151720][T11794] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.151728][T11794] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.151747][T11794] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 277.151756][T11794] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 277.151765][T11794] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 17:05:14 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 277.151780][T11794] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1eebcc06d4 [ 277.196089][T11794] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 277.251716][T11759] device lo entered promiscuous mode [ 277.327687][T11804] XFS (loop1): Invalid superblock magic number [ 277.354107][T11805] XFS (loop0): Invalid superblock magic number [ 277.363873][T11823] FAULT_INJECTION: forcing a failure. [ 277.363873][T11823] name failslab, interval 1, probability 0, space 0, times 0 [ 277.396744][T11823] CPU: 0 PID: 11823 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190628 #25 [ 277.405885][T11823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.415941][T11823] Call Trace: [ 277.419244][T11823] dump_stack+0x172/0x1f0 [ 277.423584][T11823] should_fail.cold+0xa/0x15 [ 277.428184][T11823] ? fault_create_debugfs_attr+0x180/0x180 [ 277.434001][T11823] ? ___might_sleep+0x163/0x280 [ 277.438858][T11823] __should_failslab+0x121/0x190 [ 277.443801][T11823] should_failslab+0x9/0x14 [ 277.448300][T11823] kmem_cache_alloc+0x2aa/0x710 [ 277.453153][T11823] ? current_time+0x6b/0x140 [ 277.460205][T11823] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 277.463492][T11764] device lo left promiscuous mode [ 277.466011][T11823] ? lockdep_hardirqs_on+0x418/0x5d0 [ 277.466029][T11823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.466046][T11823] ? timespec64_trunc+0xf0/0x180 [ 277.466064][T11823] __d_alloc+0x2e/0x8c0 [ 277.466086][T11823] d_alloc_pseudo+0x1e/0x70 17:05:14 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 277.466104][T11823] alloc_file_pseudo+0xe2/0x280 [ 277.466124][T11823] ? alloc_file+0x4d0/0x4d0 [ 277.505500][T11823] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 277.511756][T11823] __shmem_file_setup.part.0+0x108/0x2b0 [ 277.517403][T11823] shmem_file_setup+0x66/0x90 [ 277.522098][T11823] __x64_sys_memfd_create+0x2a2/0x470 [ 277.527481][T11823] ? memfd_fcntl+0x18c0/0x18c0 [ 277.532248][T11823] ? do_syscall_64+0x26/0x6a0 [ 277.536930][T11823] ? lockdep_hardirqs_on+0x418/0x5d0 [ 277.542222][T11823] ? trace_hardirqs_on+0x67/0x240 [ 277.547253][T11823] do_syscall_64+0xfd/0x6a0 [ 277.551771][T11823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.557666][T11823] RIP: 0033:0x459519 [ 277.561556][T11823] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.581323][T11823] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.581336][T11823] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 277.581344][T11823] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 277.581351][T11823] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 277.581358][T11823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1eebcc06d4 [ 277.581366][T11823] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 277.614951][T11825] FAULT_INJECTION: forcing a failure. [ 277.614951][T11825] name failslab, interval 1, probability 0, space 0, times 0 [ 277.664696][T11825] CPU: 0 PID: 11825 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 277.673867][T11825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.684009][T11825] Call Trace: [ 277.687305][T11825] dump_stack+0x172/0x1f0 [ 277.691640][T11825] should_fail.cold+0xa/0x15 [ 277.696232][T11825] ? fault_create_debugfs_attr+0x180/0x180 [ 277.702040][T11825] ? ___might_sleep+0x163/0x280 [ 277.706897][T11825] __should_failslab+0x121/0x190 17:05:15 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 277.711835][T11825] should_failslab+0x9/0x14 [ 277.716331][T11825] __kmalloc+0x2e0/0x770 [ 277.720572][T11825] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.726817][T11825] ? fput_many+0x12c/0x1a0 [ 277.731237][T11825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.737478][T11825] ? strnlen_user+0x1ed/0x2e0 [ 277.737495][T11825] ? __x64_sys_memfd_create+0x13c/0x470 [ 277.737516][T11825] __x64_sys_memfd_create+0x13c/0x470 [ 277.737535][T11825] ? memfd_fcntl+0x18c0/0x18c0 [ 277.737550][T11825] ? do_syscall_64+0x26/0x6a0 [ 277.737569][T11825] ? lockdep_hardirqs_on+0x418/0x5d0 [ 277.737587][T11825] ? trace_hardirqs_on+0x67/0x240 [ 277.737604][T11825] do_syscall_64+0xfd/0x6a0 [ 277.737628][T11825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.747804][T11825] RIP: 0033:0x459519 [ 277.747821][T11825] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:05:15 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 277.747829][T11825] RSP: 002b:00007faf3af1ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.747844][T11825] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 277.747853][T11825] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 277.747862][T11825] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 277.747871][T11825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faf3af1d6d4 [ 277.747880][T11825] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 277.850991][T11828] FAULT_INJECTION: forcing a failure. [ 277.850991][T11828] name failslab, interval 1, probability 0, space 0, times 0 [ 277.857451][T11779] device lo entered promiscuous mode [ 277.896469][T11830] FAULT_INJECTION: forcing a failure. [ 277.896469][T11830] name failslab, interval 1, probability 0, space 0, times 0 [ 277.902645][T11828] CPU: 0 PID: 11828 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190628 #25 [ 277.918189][T11828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.928240][T11828] Call Trace: [ 277.931532][T11828] dump_stack+0x172/0x1f0 [ 277.935862][T11828] should_fail.cold+0xa/0x15 [ 277.940461][T11828] ? fault_create_debugfs_attr+0x180/0x180 [ 277.946266][T11828] ? ___might_sleep+0x163/0x280 [ 277.951113][T11828] __should_failslab+0x121/0x190 [ 277.956045][T11828] should_failslab+0x9/0x14 [ 277.960542][T11828] kmem_cache_alloc+0x2aa/0x710 [ 277.965393][T11828] ? rwlock_bug.part.0+0x90/0x90 [ 277.970328][T11828] ? lock_downgrade+0x920/0x920 [ 277.975173][T11828] __alloc_file+0x27/0x300 [ 277.979590][T11828] alloc_empty_file+0x72/0x170 [ 277.984347][T11828] alloc_file+0x5e/0x4d0 [ 277.988594][T11828] alloc_file_pseudo+0x189/0x280 [ 277.993528][T11828] ? alloc_file+0x4d0/0x4d0 [ 277.998034][T11828] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 278.004279][T11828] __shmem_file_setup.part.0+0x108/0x2b0 [ 278.009926][T11828] shmem_file_setup+0x66/0x90 [ 278.014604][T11828] __x64_sys_memfd_create+0x2a2/0x470 [ 278.019972][T11828] ? memfd_fcntl+0x18c0/0x18c0 [ 278.024725][T11828] ? do_syscall_64+0x26/0x6a0 [ 278.029404][T11828] ? lockdep_hardirqs_on+0x418/0x5d0 [ 278.034683][T11828] ? trace_hardirqs_on+0x67/0x240 [ 278.039704][T11828] do_syscall_64+0xfd/0x6a0 [ 278.044206][T11828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.046835][T11797] device lo left promiscuous mode [ 278.050093][T11828] RIP: 0033:0x459519 [ 278.058980][T11828] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.078584][T11828] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 278.086992][T11828] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 278.094954][T11828] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 278.103125][T11828] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 278.111093][T11828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1eebcc06d4 [ 278.119064][T11828] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 278.156749][T11806] device lo entered promiscuous mode [ 278.160878][T11830] CPU: 0 PID: 11830 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 278.171167][T11830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.181219][T11830] Call Trace: [ 278.184511][T11830] dump_stack+0x172/0x1f0 [ 278.188841][T11830] should_fail.cold+0xa/0x15 [ 278.193436][T11830] ? fault_create_debugfs_attr+0x180/0x180 [ 278.199256][T11830] ? ___might_sleep+0x163/0x280 [ 278.204125][T11830] __should_failslab+0x121/0x190 [ 278.209070][T11830] ? shmem_destroy_inode+0x80/0x80 [ 278.214186][T11830] should_failslab+0x9/0x14 [ 278.218709][T11830] kmem_cache_alloc+0x2aa/0x710 [ 278.223565][T11830] ? __alloc_fd+0x487/0x620 [ 278.228076][T11830] ? shmem_destroy_inode+0x80/0x80 [ 278.233188][T11830] shmem_alloc_inode+0x1c/0x50 [ 278.237956][T11830] alloc_inode+0x68/0x1e0 [ 278.242286][T11830] new_inode_pseudo+0x19/0xf0 [ 278.247003][T11830] new_inode+0x1f/0x40 [ 278.251079][T11830] shmem_get_inode+0x84/0x7e0 [ 278.255769][T11830] __shmem_file_setup.part.0+0x7e/0x2b0 [ 278.261320][T11830] shmem_file_setup+0x66/0x90 [ 278.266007][T11830] __x64_sys_memfd_create+0x2a2/0x470 [ 278.271390][T11830] ? memfd_fcntl+0x18c0/0x18c0 [ 278.276149][T11830] ? do_syscall_64+0x26/0x6a0 [ 278.280827][T11830] ? lockdep_hardirqs_on+0x418/0x5d0 [ 278.286110][T11830] ? trace_hardirqs_on+0x67/0x240 [ 278.291135][T11830] do_syscall_64+0xfd/0x6a0 [ 278.295643][T11830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.301531][T11830] RIP: 0033:0x459519 [ 278.305419][T11830] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.325020][T11830] RSP: 002b:00007faf3af1ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 278.333428][T11830] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 278.341414][T11830] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 278.349384][T11830] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 278.357435][T11830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faf3af1d6d4 [ 278.365401][T11830] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) 17:05:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 17:05:16 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:05:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:16 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 279.189330][T11849] FAULT_INJECTION: forcing a failure. [ 279.189330][T11849] name failslab, interval 1, probability 0, space 0, times 0 [ 279.195101][T11851] FAULT_INJECTION: forcing a failure. [ 279.195101][T11851] name failslab, interval 1, probability 0, space 0, times 0 [ 279.208201][T11847] device lo left promiscuous mode [ 279.225517][T11849] CPU: 1 PID: 11849 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 279.234641][T11849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.244690][T11849] Call Trace: [ 279.244714][T11849] dump_stack+0x172/0x1f0 [ 279.244736][T11849] should_fail.cold+0xa/0x15 [ 279.244757][T11849] ? fault_create_debugfs_attr+0x180/0x180 [ 279.252346][T11849] ? ___might_sleep+0x163/0x280 [ 279.252369][T11849] __should_failslab+0x121/0x190 [ 279.252386][T11849] should_failslab+0x9/0x14 [ 279.252403][T11849] kmem_cache_alloc+0x2aa/0x710 [ 279.262759][T11849] ? current_time+0x6b/0x140 [ 279.262780][T11849] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 279.262799][T11849] ? lockdep_hardirqs_on+0x418/0x5d0 [ 279.262814][T11849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.262832][T11849] ? timespec64_trunc+0xf0/0x180 [ 279.272580][T11849] __d_alloc+0x2e/0x8c0 [ 279.272602][T11849] d_alloc_pseudo+0x1e/0x70 [ 279.272619][T11849] alloc_file_pseudo+0xe2/0x280 [ 279.272636][T11849] ? alloc_file+0x4d0/0x4d0 [ 279.326641][T11849] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 279.332898][T11849] __shmem_file_setup.part.0+0x108/0x2b0 [ 279.338543][T11849] shmem_file_setup+0x66/0x90 [ 279.343228][T11849] __x64_sys_memfd_create+0x2a2/0x470 [ 279.348598][T11849] ? memfd_fcntl+0x18c0/0x18c0 [ 279.353359][T11849] ? do_syscall_64+0x26/0x6a0 [ 279.358033][T11849] ? lockdep_hardirqs_on+0x418/0x5d0 [ 279.363318][T11849] ? trace_hardirqs_on+0x67/0x240 [ 279.368345][T11849] do_syscall_64+0xfd/0x6a0 [ 279.372858][T11849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.378739][T11849] RIP: 0033:0x459519 [ 279.382631][T11849] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.402225][T11849] RSP: 002b:00007faf3af1ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 279.410630][T11849] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 279.418775][T11849] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 279.426743][T11849] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 279.434713][T11849] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faf3af1d6d4 [ 279.442675][T11849] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 279.450727][T11851] CPU: 0 PID: 11851 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190628 #25 [ 279.463386][T11851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.473441][T11851] Call Trace: [ 279.476735][T11851] dump_stack+0x172/0x1f0 [ 279.481068][T11851] should_fail.cold+0xa/0x15 [ 279.485670][T11851] ? fault_create_debugfs_attr+0x180/0x180 [ 279.491490][T11851] ? ___might_sleep+0x163/0x280 [ 279.496357][T11851] __should_failslab+0x121/0x190 [ 279.501305][T11851] should_failslab+0x9/0x14 [ 279.505810][T11851] kmem_cache_alloc+0x2aa/0x710 [ 279.510669][T11851] ? rcu_read_lock_sched_held+0x110/0x130 [ 279.516392][T11851] ? kmem_cache_alloc+0x361/0x710 [ 279.521427][T11851] security_file_alloc+0x39/0x170 [ 279.526459][T11851] __alloc_file+0xac/0x300 [ 279.530885][T11851] alloc_empty_file+0x72/0x170 [ 279.535662][T11851] alloc_file+0x5e/0x4d0 [ 279.539915][T11851] alloc_file_pseudo+0x189/0x280 [ 279.544856][T11851] ? alloc_file+0x4d0/0x4d0 [ 279.549367][T11851] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 279.555624][T11851] __shmem_file_setup.part.0+0x108/0x2b0 [ 279.561340][T11851] shmem_file_setup+0x66/0x90 [ 279.566036][T11851] __x64_sys_memfd_create+0x2a2/0x470 [ 279.571423][T11851] ? memfd_fcntl+0x18c0/0x18c0 [ 279.576194][T11851] ? do_syscall_64+0x26/0x6a0 [ 279.580883][T11851] ? lockdep_hardirqs_on+0x418/0x5d0 [ 279.586175][T11851] ? trace_hardirqs_on+0x67/0x240 [ 279.591209][T11851] do_syscall_64+0xfd/0x6a0 [ 279.595725][T11851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.601617][T11851] RIP: 0033:0x459519 [ 279.605618][T11851] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.625226][T11851] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 279.633702][T11851] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 17:05:16 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 279.641664][T11851] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 279.649620][T11851] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 279.654127][T11848] XFS (loop0): Invalid superblock magic number [ 279.657579][T11851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1eebcc06d4 [ 279.657588][T11851] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 279.673051][T11847] device lo entered promiscuous mode [ 279.681692][T11852] XFS (loop1): Invalid superblock magic number 17:05:17 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 279.721151][T11873] FAULT_INJECTION: forcing a failure. [ 279.721151][T11873] name failslab, interval 1, probability 0, space 0, times 0 [ 279.741519][T11873] CPU: 1 PID: 11873 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 279.750657][T11873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.760714][T11873] Call Trace: [ 279.764011][T11873] dump_stack+0x172/0x1f0 [ 279.768354][T11873] should_fail.cold+0xa/0x15 [ 279.772942][T11873] ? fault_create_debugfs_attr+0x180/0x180 [ 279.778761][T11873] ? ___might_sleep+0x163/0x280 [ 279.783626][T11873] __should_failslab+0x121/0x190 [ 279.788576][T11873] should_failslab+0x9/0x14 [ 279.793099][T11873] kmem_cache_alloc+0x2aa/0x710 [ 279.797959][T11873] ? rwlock_bug.part.0+0x90/0x90 [ 279.802907][T11873] ? lock_downgrade+0x920/0x920 [ 279.807774][T11873] __alloc_file+0x27/0x300 [ 279.812197][T11873] alloc_empty_file+0x72/0x170 [ 279.816969][T11873] alloc_file+0x5e/0x4d0 [ 279.821222][T11873] alloc_file_pseudo+0x189/0x280 [ 279.826171][T11873] ? alloc_file+0x4d0/0x4d0 [ 279.830682][T11873] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 279.836945][T11873] __shmem_file_setup.part.0+0x108/0x2b0 [ 279.839783][T11877] FAULT_INJECTION: forcing a failure. [ 279.839783][T11877] name failslab, interval 1, probability 0, space 0, times 0 [ 279.842623][T11873] shmem_file_setup+0x66/0x90 [ 279.842645][T11873] __x64_sys_memfd_create+0x2a2/0x470 [ 279.842664][T11873] ? memfd_fcntl+0x18c0/0x18c0 [ 279.842680][T11873] ? do_syscall_64+0x26/0x6a0 [ 279.842697][T11873] ? lockdep_hardirqs_on+0x418/0x5d0 [ 279.842712][T11873] ? trace_hardirqs_on+0x67/0x240 [ 279.842736][T11873] do_syscall_64+0xfd/0x6a0 [ 279.889594][T11873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.895480][T11873] RIP: 0033:0x459519 [ 279.899457][T11873] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.919053][T11873] RSP: 002b:00007faf3af1ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 279.927548][T11873] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 279.935519][T11873] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 279.943483][T11873] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 279.951456][T11873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faf3af1d6d4 [ 279.959428][T11873] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 279.967502][T11877] CPU: 0 PID: 11877 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190628 #25 [ 279.976621][T11877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.986677][T11877] Call Trace: [ 279.989977][T11877] dump_stack+0x172/0x1f0 [ 279.994310][T11877] should_fail.cold+0xa/0x15 [ 279.998899][T11877] ? fault_create_debugfs_attr+0x180/0x180 [ 280.004718][T11877] ? ___might_sleep+0x163/0x280 [ 280.009589][T11877] __should_failslab+0x121/0x190 [ 280.014528][T11877] should_failslab+0x9/0x14 [ 280.019035][T11877] __kmalloc+0x2e0/0x770 [ 280.023278][T11877] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 280.029002][T11877] ? rcu_read_lock_sched_held+0x110/0x130 [ 280.034718][T11877] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 280.040450][T11877] tomoyo_realpath_from_path+0xcd/0x7a0 [ 280.046001][T11877] ? tomoyo_path_perm+0x1cb/0x430 [ 280.051033][T11877] tomoyo_path_perm+0x230/0x430 [ 280.055883][T11877] ? tomoyo_path_perm+0x1cb/0x430 [ 280.060912][T11877] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 280.066996][T11877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.073269][T11877] tomoyo_path_truncate+0x1d/0x30 [ 280.078293][T11877] security_path_truncate+0xf2/0x150 [ 280.083582][T11877] do_sys_ftruncate+0x3d9/0x550 [ 280.088440][T11877] __x64_sys_ftruncate+0x59/0x80 [ 280.093373][T11877] do_syscall_64+0xfd/0x6a0 [ 280.097880][T11877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.103771][T11877] RIP: 0033:0x4594e7 [ 280.107673][T11877] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.127273][T11877] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 280.135690][T11877] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004594e7 [ 280.143656][T11877] RDX: 0000000020000128 RSI: 0000000008100000 RDI: 0000000000000004 [ 280.151627][T11877] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 280.151634][T11877] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 17:05:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:17 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 280.151642][T11877] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 280.189792][T11877] ERROR: Out of memory at tomoyo_realpath_from_path. [ 280.190721][T11881] FAULT_INJECTION: forcing a failure. [ 280.190721][T11881] name failslab, interval 1, probability 0, space 0, times 0 [ 280.224181][T11880] device lo left promiscuous mode [ 280.234702][T11881] CPU: 0 PID: 11881 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 280.243831][T11881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.253885][T11881] Call Trace: [ 280.257192][T11881] dump_stack+0x172/0x1f0 [ 280.261534][T11881] should_fail.cold+0xa/0x15 [ 280.266133][T11881] ? fault_create_debugfs_attr+0x180/0x180 [ 280.271950][T11881] ? ___might_sleep+0x163/0x280 [ 280.276812][T11881] __should_failslab+0x121/0x190 [ 280.281756][T11881] should_failslab+0x9/0x14 [ 280.286262][T11881] kmem_cache_alloc+0x2aa/0x710 [ 280.291118][T11881] ? rcu_read_lock_sched_held+0x110/0x130 [ 280.296843][T11881] ? kmem_cache_alloc+0x361/0x710 [ 280.301873][T11881] security_file_alloc+0x39/0x170 [ 280.306904][T11881] __alloc_file+0xac/0x300 [ 280.311328][T11881] alloc_empty_file+0x72/0x170 [ 280.316099][T11881] alloc_file+0x5e/0x4d0 [ 280.320354][T11881] alloc_file_pseudo+0x189/0x280 [ 280.325308][T11881] ? alloc_file+0x4d0/0x4d0 [ 280.329817][T11881] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 280.336073][T11881] __shmem_file_setup.part.0+0x108/0x2b0 [ 280.341730][T11881] shmem_file_setup+0x66/0x90 [ 280.346419][T11881] __x64_sys_memfd_create+0x2a2/0x470 [ 280.351799][T11881] ? memfd_fcntl+0x18c0/0x18c0 [ 280.356566][T11881] ? do_syscall_64+0x26/0x6a0 [ 280.361246][T11881] ? lockdep_hardirqs_on+0x418/0x5d0 [ 280.366540][T11881] ? trace_hardirqs_on+0x67/0x240 [ 280.371575][T11881] do_syscall_64+0xfd/0x6a0 [ 280.376092][T11881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.381986][T11881] RIP: 0033:0x459519 [ 280.385891][T11881] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.405582][T11881] RSP: 002b:00007faf3af1ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 280.413992][T11881] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 280.421955][T11881] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 280.429929][T11881] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 280.437912][T11881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faf3af1d6d4 [ 280.445884][T11881] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:17 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 280.569583][T11877] XFS (loop4): Mounting V4 Filesystem [ 280.596139][T11898] FAULT_INJECTION: forcing a failure. [ 280.596139][T11898] name failslab, interval 1, probability 0, space 0, times 0 [ 280.609163][T11898] CPU: 1 PID: 11898 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 280.618273][T11898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.628326][T11898] Call Trace: [ 280.631618][T11898] dump_stack+0x172/0x1f0 [ 280.635951][T11898] should_fail.cold+0xa/0x15 [ 280.640542][T11898] ? fault_create_debugfs_attr+0x180/0x180 [ 280.646356][T11898] ? ___might_sleep+0x163/0x280 [ 280.651217][T11898] __should_failslab+0x121/0x190 [ 280.651240][T11898] should_failslab+0x9/0x14 [ 280.660633][T11898] __kmalloc+0x2e0/0x770 [ 280.660656][T11898] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 280.660675][T11898] ? rcu_read_lock_sched_held+0x110/0x130 [ 280.660693][T11898] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 280.682055][T11898] tomoyo_realpath_from_path+0xcd/0x7a0 [ 280.687599][T11898] ? tomoyo_path_perm+0x1cb/0x430 [ 280.692628][T11898] tomoyo_path_perm+0x230/0x430 [ 280.697481][T11898] ? tomoyo_path_perm+0x1cb/0x430 [ 280.702508][T11898] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 280.708592][T11898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.714858][T11898] tomoyo_path_truncate+0x1d/0x30 [ 280.719880][T11898] security_path_truncate+0xf2/0x150 [ 280.725172][T11898] do_sys_ftruncate+0x3d9/0x550 [ 280.730036][T11898] __x64_sys_ftruncate+0x59/0x80 [ 280.734984][T11898] do_syscall_64+0xfd/0x6a0 [ 280.739492][T11898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.745379][T11898] RIP: 0033:0x4594e7 [ 280.749267][T11898] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.768867][T11898] RSP: 002b:00007faf3af1ca88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 280.777302][T11898] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004594e7 [ 280.785271][T11898] RDX: 0000000020000128 RSI: 0000000008100000 RDI: 0000000000000004 [ 280.793329][T11898] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 280.801294][T11898] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 280.809260][T11898] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 280.826848][T11898] ERROR: Out of memory at tomoyo_realpath_from_path. [ 280.858370][T11877] XFS (loop4): empty log check failed [ 280.868346][T11877] XFS (loop4): log mount/recovery failed: error -5 [ 280.927119][T11877] XFS (loop4): log mount failed [ 281.074628][T11898] XFS (loop2): Mounting V4 Filesystem [ 281.092780][T11902] XFS (loop1): Invalid superblock magic number [ 281.128998][T11898] XFS (loop2): empty log check failed [ 281.134620][T11898] XFS (loop2): log mount/recovery failed: error -5 [ 281.166768][T11898] XFS (loop2): log mount failed 17:05:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) 17:05:19 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:05:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:05:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 282.403357][T11949] device lo left promiscuous mode [ 282.419117][T11933] XFS (loop2): Mounting V4 Filesystem [ 282.440051][T11932] XFS (loop1): Invalid superblock magic number [ 282.472517][T11938] XFS (loop4): Mounting V4 Filesystem [ 282.495968][T11933] XFS (loop2): empty log check failed [ 282.506691][T11940] XFS (loop0): Invalid superblock magic number [ 282.518836][T11933] XFS (loop2): log mount/recovery failed: error -5 [ 282.547236][T11938] XFS (loop4): empty log check failed [ 282.586740][T11938] XFS (loop4): log mount/recovery failed: error -5 [ 282.636818][T11933] XFS (loop2): log mount failed 17:05:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 282.713844][T11938] XFS (loop4): log mount failed 17:05:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 17:05:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:05:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 283.390040][T11989] XFS (loop1): Invalid superblock magic number [ 283.435786][T11991] XFS (loop0): Invalid superblock magic number 17:05:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:05:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:05:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 284.222346][T12043] XFS (loop1): Invalid superblock magic number 17:05:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 284.262604][T12049] XFS (loop0): Invalid superblock magic number 17:05:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 17:05:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:05:22 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 284.985207][T12091] XFS (loop1): Invalid superblock magic number 17:05:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 285.064677][T12112] FAULT_INJECTION: forcing a failure. [ 285.064677][T12112] name failslab, interval 1, probability 0, space 0, times 0 [ 285.078329][T12112] CPU: 1 PID: 12112 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190628 #25 [ 285.087443][T12112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.097503][T12112] Call Trace: [ 285.100804][T12112] dump_stack+0x172/0x1f0 [ 285.105151][T12112] should_fail.cold+0xa/0x15 17:05:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 285.109758][T12112] ? fault_create_debugfs_attr+0x180/0x180 [ 285.115579][T12112] ? ___might_sleep+0x163/0x280 [ 285.120447][T12112] __should_failslab+0x121/0x190 [ 285.125398][T12112] should_failslab+0x9/0x14 [ 285.129906][T12112] __kmalloc+0x2e0/0x770 [ 285.134157][T12112] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 285.140399][T12112] ? fput_many+0x12c/0x1a0 [ 285.144869][T12112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.151121][T12112] ? strnlen_user+0x1ed/0x2e0 [ 285.155804][T12112] ? __x64_sys_memfd_create+0x13c/0x470 [ 285.161350][T12112] __x64_sys_memfd_create+0x13c/0x470 [ 285.166724][T12112] ? memfd_fcntl+0x18c0/0x18c0 [ 285.171488][T12112] ? do_syscall_64+0x26/0x6a0 [ 285.176170][T12112] ? lockdep_hardirqs_on+0x418/0x5d0 [ 285.181458][T12112] ? trace_hardirqs_on+0x67/0x240 [ 285.186490][T12112] do_syscall_64+0xfd/0x6a0 [ 285.191006][T12112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.196893][T12112] RIP: 0033:0x459519 [ 285.200787][T12112] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.220411][T12112] RSP: 002b:00007fcf60acaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 285.228818][T12112] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 285.236786][T12112] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 285.244738][T12112] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 285.252692][T12112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf60acb6d4 [ 285.260644][T12112] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:22 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 285.341455][T12109] XFS (loop0): Invalid superblock magic number [ 285.500335][T12131] FAULT_INJECTION: forcing a failure. [ 285.500335][T12131] name failslab, interval 1, probability 0, space 0, times 0 [ 285.526966][T12131] CPU: 1 PID: 12131 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190628 #25 [ 285.536092][T12131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.546141][T12131] Call Trace: [ 285.549435][T12131] dump_stack+0x172/0x1f0 [ 285.553771][T12131] should_fail.cold+0xa/0x15 [ 285.558366][T12131] ? fault_create_debugfs_attr+0x180/0x180 [ 285.564180][T12131] ? ___might_sleep+0x163/0x280 [ 285.569037][T12131] __should_failslab+0x121/0x190 [ 285.573975][T12131] ? shmem_destroy_inode+0x80/0x80 [ 285.579084][T12131] should_failslab+0x9/0x14 [ 285.583590][T12131] kmem_cache_alloc+0x2aa/0x710 [ 285.588455][T12131] ? __alloc_fd+0x487/0x620 [ 285.592961][T12131] ? shmem_destroy_inode+0x80/0x80 [ 285.598055][T12131] shmem_alloc_inode+0x1c/0x50 [ 285.602798][T12131] alloc_inode+0x68/0x1e0 [ 285.607114][T12131] new_inode_pseudo+0x19/0xf0 [ 285.611845][T12131] new_inode+0x1f/0x40 [ 285.615901][T12131] shmem_get_inode+0x84/0x7e0 [ 285.620559][T12131] __shmem_file_setup.part.0+0x7e/0x2b0 [ 285.626083][T12131] shmem_file_setup+0x66/0x90 [ 285.630752][T12131] __x64_sys_memfd_create+0x2a2/0x470 [ 285.638594][T12131] ? memfd_fcntl+0x18c0/0x18c0 [ 285.643477][T12131] ? do_syscall_64+0x26/0x6a0 [ 285.648162][T12131] ? lockdep_hardirqs_on+0x418/0x5d0 [ 285.653438][T12131] ? trace_hardirqs_on+0x67/0x240 [ 285.658457][T12131] do_syscall_64+0xfd/0x6a0 [ 285.662943][T12131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.668813][T12131] RIP: 0033:0x459519 [ 285.672698][T12131] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.692304][T12131] RSP: 002b:00007fcf60acaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:05:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 285.700785][T12131] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 285.708754][T12131] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 285.716749][T12131] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 285.724718][T12131] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf60acb6d4 [ 285.732679][T12131] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:23 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 285.965304][T12144] FAULT_INJECTION: forcing a failure. [ 285.965304][T12144] name failslab, interval 1, probability 0, space 0, times 0 17:05:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 286.014876][T12144] CPU: 1 PID: 12144 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190628 #25 [ 286.024023][T12144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.034081][T12144] Call Trace: [ 286.037382][T12144] dump_stack+0x172/0x1f0 [ 286.041729][T12144] should_fail.cold+0xa/0x15 [ 286.046335][T12144] ? fault_create_debugfs_attr+0x180/0x180 [ 286.052157][T12144] ? ___might_sleep+0x163/0x280 [ 286.057021][T12144] __should_failslab+0x121/0x190 [ 286.061964][T12144] should_failslab+0x9/0x14 [ 286.066468][T12144] kmem_cache_alloc+0x2aa/0x710 [ 286.071321][T12144] ? current_time+0x6b/0x140 [ 286.075903][T12144] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 286.081714][T12144] ? lockdep_hardirqs_on+0x418/0x5d0 [ 286.086996][T12144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.093238][T12144] ? timespec64_trunc+0xf0/0x180 [ 286.098189][T12144] __d_alloc+0x2e/0x8c0 [ 286.102350][T12144] d_alloc_pseudo+0x1e/0x70 [ 286.106851][T12144] alloc_file_pseudo+0xe2/0x280 [ 286.111693][T12144] ? alloc_file+0x4d0/0x4d0 [ 286.116195][T12144] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 286.122451][T12144] __shmem_file_setup.part.0+0x108/0x2b0 [ 286.128087][T12144] shmem_file_setup+0x66/0x90 [ 286.132766][T12144] __x64_sys_memfd_create+0x2a2/0x470 [ 286.138139][T12144] ? memfd_fcntl+0x18c0/0x18c0 [ 286.142911][T12144] ? do_syscall_64+0x26/0x6a0 [ 286.147588][T12144] ? lockdep_hardirqs_on+0x418/0x5d0 [ 286.152872][T12144] ? trace_hardirqs_on+0x67/0x240 [ 286.157895][T12144] do_syscall_64+0xfd/0x6a0 [ 286.162400][T12144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.168286][T12144] RIP: 0033:0x459519 [ 286.172178][T12144] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.191776][T12144] RSP: 002b:00007fcf60acaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 286.200186][T12144] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 17:05:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 286.208155][T12144] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 286.216130][T12144] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 286.224156][T12144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf60acb6d4 [ 286.232134][T12144] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:23 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 286.568057][T12162] XFS (loop0): Invalid superblock magic number [ 286.575612][T12174] FAULT_INJECTION: forcing a failure. [ 286.575612][T12174] name failslab, interval 1, probability 0, space 0, times 0 17:05:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 286.644420][T12148] XFS (loop1): Invalid superblock magic number [ 286.669938][T12174] CPU: 1 PID: 12174 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190628 #25 [ 286.679082][T12174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.689226][T12174] Call Trace: [ 286.692523][T12174] dump_stack+0x172/0x1f0 [ 286.696856][T12174] should_fail.cold+0xa/0x15 [ 286.701443][T12174] ? fault_create_debugfs_attr+0x180/0x180 [ 286.707251][T12174] ? ___might_sleep+0x163/0x280 [ 286.712118][T12174] __should_failslab+0x121/0x190 [ 286.717069][T12174] should_failslab+0x9/0x14 [ 286.721592][T12174] kmem_cache_alloc+0x2aa/0x710 [ 286.726452][T12174] ? rwlock_bug.part.0+0x90/0x90 [ 286.731398][T12174] ? lock_downgrade+0x920/0x920 [ 286.736257][T12174] __alloc_file+0x27/0x300 [ 286.740680][T12174] alloc_empty_file+0x72/0x170 [ 286.745449][T12174] alloc_file+0x5e/0x4d0 [ 286.749694][T12174] alloc_file_pseudo+0x189/0x280 [ 286.754640][T12174] ? alloc_file+0x4d0/0x4d0 [ 286.759153][T12174] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 286.765407][T12174] __shmem_file_setup.part.0+0x108/0x2b0 [ 286.771039][T12174] shmem_file_setup+0x66/0x90 [ 286.775714][T12174] __x64_sys_memfd_create+0x2a2/0x470 [ 286.781094][T12174] ? memfd_fcntl+0x18c0/0x18c0 [ 286.785860][T12174] ? do_syscall_64+0x26/0x6a0 [ 286.790537][T12174] ? lockdep_hardirqs_on+0x418/0x5d0 [ 286.795817][T12174] ? trace_hardirqs_on+0x67/0x240 [ 286.800869][T12174] do_syscall_64+0xfd/0x6a0 [ 286.805375][T12174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.811263][T12174] RIP: 0033:0x459519 [ 286.815156][T12174] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.834753][T12174] RSP: 002b:00007fcf60acaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 286.843162][T12174] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 286.851140][T12174] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 286.859116][T12174] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 286.867082][T12174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf60acb6d4 [ 286.875046][T12174] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:24 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 287.099984][T12194] FAULT_INJECTION: forcing a failure. [ 287.099984][T12194] name failslab, interval 1, probability 0, space 0, times 0 [ 287.185445][T12194] CPU: 0 PID: 12194 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190628 #25 [ 287.194595][T12194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.204655][T12194] Call Trace: [ 287.207962][T12194] dump_stack+0x172/0x1f0 [ 287.212303][T12194] should_fail.cold+0xa/0x15 [ 287.216904][T12194] ? fault_create_debugfs_attr+0x180/0x180 [ 287.222899][T12194] ? ___might_sleep+0x163/0x280 [ 287.227765][T12194] __should_failslab+0x121/0x190 [ 287.232727][T12194] should_failslab+0x9/0x14 [ 287.237238][T12194] kmem_cache_alloc+0x2aa/0x710 [ 287.242095][T12194] ? kasan_check_read+0x11/0x20 [ 287.246948][T12194] ? preempt_schedule_common+0x63/0xe0 [ 287.252413][T12194] __alloc_file+0x27/0x300 [ 287.256841][T12194] alloc_empty_file+0x72/0x170 [ 287.261617][T12194] alloc_file+0x5e/0x4d0 [ 287.265867][T12194] alloc_file_pseudo+0x189/0x280 [ 287.270806][T12194] ? alloc_file+0x4d0/0x4d0 [ 287.275306][T12194] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 17:05:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 287.275331][T12194] __shmem_file_setup.part.0+0x108/0x2b0 [ 287.287170][T12194] shmem_file_setup+0x66/0x90 [ 287.287190][T12194] __x64_sys_memfd_create+0x2a2/0x470 [ 287.287206][T12194] ? memfd_fcntl+0x18c0/0x18c0 [ 287.287228][T12194] ? do_syscall_64+0x26/0x6a0 [ 287.306651][T12194] ? lockdep_hardirqs_on+0x418/0x5d0 [ 287.311940][T12194] ? trace_hardirqs_on+0x67/0x240 [ 287.317058][T12194] do_syscall_64+0xfd/0x6a0 [ 287.321550][T12194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.327431][T12194] RIP: 0033:0x459519 [ 287.331307][T12194] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.350886][T12194] RSP: 002b:00007fcf60acaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 287.359272][T12194] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 287.367226][T12194] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 287.375183][T12194] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 287.383131][T12194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf60acb6d4 [ 287.391080][T12194] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:24 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:05:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 287.665197][T12210] FAULT_INJECTION: forcing a failure. [ 287.665197][T12210] name failslab, interval 1, probability 0, space 0, times 0 17:05:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 287.782404][T12210] CPU: 1 PID: 12210 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190628 #25 [ 287.791575][T12210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.801648][T12210] Call Trace: [ 287.804955][T12210] dump_stack+0x172/0x1f0 [ 287.809305][T12210] should_fail.cold+0xa/0x15 [ 287.813908][T12210] ? fault_create_debugfs_attr+0x180/0x180 [ 287.819732][T12210] ? ___might_sleep+0x163/0x280 [ 287.824598][T12210] __should_failslab+0x121/0x190 [ 287.829540][T12210] should_failslab+0x9/0x14 [ 287.834051][T12210] kmem_cache_alloc+0x2aa/0x710 [ 287.838910][T12210] ? rcu_read_lock_sched_held+0x110/0x130 [ 287.844622][T12210] ? kmem_cache_alloc+0x361/0x710 [ 287.849732][T12210] security_file_alloc+0x39/0x170 [ 287.854755][T12210] __alloc_file+0xac/0x300 [ 287.859181][T12210] alloc_empty_file+0x72/0x170 [ 287.863954][T12210] alloc_file+0x5e/0x4d0 [ 287.868206][T12210] alloc_file_pseudo+0x189/0x280 [ 287.873267][T12210] ? alloc_file+0x4d0/0x4d0 [ 287.877773][T12210] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 287.882322][T12205] XFS (loop0): Invalid superblock magic number [ 287.884023][T12210] __shmem_file_setup.part.0+0x108/0x2b0 [ 287.884045][T12210] shmem_file_setup+0x66/0x90 [ 287.884065][T12210] __x64_sys_memfd_create+0x2a2/0x470 [ 287.884079][T12210] ? memfd_fcntl+0x18c0/0x18c0 [ 287.884098][T12210] ? do_syscall_64+0x26/0x6a0 [ 287.915223][T12210] ? lockdep_hardirqs_on+0x418/0x5d0 [ 287.920659][T12210] ? trace_hardirqs_on+0x67/0x240 [ 287.925677][T12210] do_syscall_64+0xfd/0x6a0 [ 287.930182][T12210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.936062][T12210] RIP: 0033:0x459519 [ 287.939944][T12210] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.957924][T12216] XFS (loop1): Invalid superblock magic number [ 287.959540][T12210] RSP: 002b:00007fcf60acaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 287.959556][T12210] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 17:05:25 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 287.959565][T12210] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 287.959575][T12210] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 287.959584][T12210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf60acb6d4 [ 287.959592][T12210] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 288.226481][T12241] FAULT_INJECTION: forcing a failure. [ 288.226481][T12241] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 288.239713][T12241] CPU: 1 PID: 12241 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190628 #25 [ 288.248822][T12241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.258877][T12241] Call Trace: [ 288.262169][T12241] dump_stack+0x172/0x1f0 [ 288.266499][T12241] should_fail.cold+0xa/0x15 [ 288.271096][T12241] ? fault_create_debugfs_attr+0x180/0x180 [ 288.276911][T12241] ? is_bpf_text_address+0xac/0x170 [ 288.282215][T12241] should_fail_alloc_page+0x50/0x60 [ 288.287416][T12241] __alloc_pages_nodemask+0x1a1/0x8f0 [ 288.292787][T12241] ? __alloc_pages_slowpath+0x2520/0x2520 [ 288.298503][T12241] ? kasan_check_read+0x11/0x20 [ 288.303353][T12241] ? fault_create_debugfs_attr+0x180/0x180 [ 288.309161][T12241] cache_grow_begin+0x90/0xd20 [ 288.313926][T12241] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 288.319647][T12241] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.325886][T12241] __kmalloc+0x6af/0x770 [ 288.330133][T12241] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 288.335853][T12241] tomoyo_realpath_from_path+0xcd/0x7a0 [ 288.341391][T12241] ? tomoyo_path_perm+0x1cb/0x430 [ 288.346417][T12241] tomoyo_path_perm+0x230/0x430 [ 288.351259][T12241] ? tomoyo_path_perm+0x1cb/0x430 [ 288.356284][T12241] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 288.362376][T12241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.368641][T12241] tomoyo_path_truncate+0x1d/0x30 [ 288.373666][T12241] security_path_truncate+0xf2/0x150 [ 288.378955][T12241] do_sys_ftruncate+0x3d9/0x550 [ 288.383813][T12241] __x64_sys_ftruncate+0x59/0x80 [ 288.391093][T12241] do_syscall_64+0xfd/0x6a0 [ 288.398131][T12241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.404017][T12241] RIP: 0033:0x4594e7 [ 288.407908][T12241] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:05:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 288.427503][T12241] RSP: 002b:00007fcf60acaa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 288.435908][T12241] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004594e7 [ 288.443872][T12241] RDX: 0000000020000128 RSI: 0000000008100000 RDI: 0000000000000004 [ 288.451835][T12241] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 288.459798][T12241] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 288.467767][T12241] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 17:05:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:05:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:05:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 288.793359][T12241] XFS (loop3): Mounting V4 Filesystem [ 288.870963][T12241] XFS (loop3): empty log check failed [ 288.882243][T12241] XFS (loop3): log mount/recovery failed: error -5 [ 288.892313][T12248] XFS (loop1): Invalid superblock magic number [ 288.947004][T12241] XFS (loop3): log mount failed 17:05:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 289.114673][T12272] XFS (loop0): Invalid superblock magic number 17:05:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 17:05:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 289.685746][T12303] XFS (loop1): Invalid superblock magic number 17:05:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/62, 0x3e}], 0x0, 0x0) [ 289.813019][T12308] XFS (loop3): Mounting V4 Filesystem [ 289.861986][T12308] XFS (loop3): empty log check failed [ 289.871661][T12308] XFS (loop3): log mount/recovery failed: error -5 [ 289.966804][T12308] XFS (loop3): log mount failed 17:05:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 290.249184][T12341] XFS (loop0): device supports 512 byte sectors (not 0) 17:05:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 290.588394][T12368] XFS (loop1): Invalid superblock magic number 17:05:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/62, 0x3e}], 0x0, 0x0) 17:05:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 291.075393][T12397] XFS (loop0): device supports 512 byte sectors (not 0) 17:05:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 291.446702][T12414] XFS (loop1): Invalid superblock magic number 17:05:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/62, 0x3e}], 0x0, 0x0) 17:05:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 17:05:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 292.165973][T12455] XFS (loop0): device supports 512 byte sectors (not 0) [ 292.243440][T12467] XFS (loop1): Invalid superblock magic number 17:05:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/59, 0x3b}], 0x0, 0x0) 17:05:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100", 0x5d}], 0x0, 0x0) 17:05:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 293.364872][T12528] XFS (loop0): device supports 512 byte sectors (not 0) 17:05:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 293.416494][T12527] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:31 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r0, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r1, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/59, 0x3b}], 0x0, 0x0) 17:05:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100", 0x5d}], 0x0, 0x0) 17:05:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 294.373762][T12589] XFS (loop0): device supports 512 byte sectors (not 0) [ 294.381186][T12587] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:31 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r0, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r1, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/59, 0x3b}], 0x0, 0x0) 17:05:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100", 0x5d}], 0x0, 0x0) 17:05:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 295.140906][T12631] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:32 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r0, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r1, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 295.473298][T12642] XFS (loop0): device supports 512 byte sectors (not 0) 17:05:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000010000100000", 0x59}], 0x0, 0x0) 17:05:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 296.022347][T12684] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:33 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007", 0x6d}], 0x0, 0x0) 17:05:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000010000100000", 0x59}], 0x0, 0x0) 17:05:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 296.744492][T12719] XFS (loop0): SB sanity check failed [ 296.763735][T12719] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 296.796807][T12719] XFS (loop0): Unmount and run xfs_repair [ 296.802771][T12719] XFS (loop0): First 128 bytes of corrupted metadata buffer: 17:05:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 296.838123][T12719] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 296.867837][T12719] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 296.922746][T12719] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 296.953176][T12719] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:05:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 296.969422][T12719] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 297.014108][T12719] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 297.030650][T12719] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 297.043650][T12741] XFS (loop1): device supports 512 byte sectors (not 0) [ 297.054627][T12719] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 297.081966][T12719] XFS (loop0): SB validate failed with error -117. 17:05:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007", 0x6d}], 0x0, 0x0) 17:05:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000010000100000", 0x59}], 0x0, 0x0) 17:05:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 297.788196][T12782] XFS (loop1): device supports 512 byte sectors (not 0) [ 297.853229][T12797] XFS (loop0): SB sanity check failed [ 297.866894][T12797] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 297.884985][T12797] XFS (loop0): Unmount and run xfs_repair [ 297.891115][T12797] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 297.898884][T12797] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 297.908089][T12797] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 297.932222][T12797] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 297.985009][T12797] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 298.088295][T12797] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 298.110065][T12797] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 298.126416][T12797] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 298.138524][T12797] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 298.162909][T12797] XFS (loop0): SB validate failed with error -117. 17:05:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 17:05:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007", 0x6d}], 0x0, 0x0) 17:05:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 298.792660][T12839] XFS (loop1): SB sanity check failed [ 298.802851][T12839] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 298.896430][T12839] XFS (loop1): Unmount and run xfs_repair [ 298.924491][T12839] XFS (loop1): First 128 bytes of corrupted metadata buffer: 17:05:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 299.086839][T12839] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 299.095718][T12839] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 299.104810][T12839] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 299.129720][ T8747] XFS (loop0): SB sanity check failed [ 299.136109][ T8747] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 299.152657][T12839] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 299.181536][T12839] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 299.191798][ T8747] XFS (loop0): Unmount and run xfs_repair [ 299.206452][ T8747] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 299.214072][T12839] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 299.234734][ T8747] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 299.256795][T12839] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 299.283579][ T8747] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 299.329566][T12839] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 299.351738][ T8747] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 17:05:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 299.380549][T12839] XFS (loop1): SB validate failed with error -117. [ 299.408883][ T8747] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 299.452601][ T8747] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 299.527508][ T8747] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 299.617945][ T8747] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:05:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 299.695003][ T8747] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 299.732217][T12861] XFS (loop0): SB validate failed with error -117. 17:05:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000", 0x5a}], 0x0, 0x0) 17:05:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:37 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4020001000010070000000000000000", 0x75}], 0x0, 0x0) 17:05:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 300.387821][T12924] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 300.703626][T12949] XFS (loop0): SB sanity check failed [ 300.731207][T12949] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 300.853391][T12949] XFS (loop0): Unmount and run xfs_repair [ 300.871417][T12949] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 300.903590][T12949] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 300.920053][T12949] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 300.929447][T12949] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 300.940125][T12949] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:05:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 300.989945][T12949] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 301.025457][T12949] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 301.050159][T12949] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:05:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000", 0x5a}], 0x0, 0x0) [ 301.127255][T12949] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:05:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 301.221660][T12949] XFS (loop0): SB validate failed with error -117. 17:05:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 301.576380][T12993] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:38 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4020001000010070000000000000000", 0x75}], 0x0, 0x0) 17:05:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000", 0x5a}], 0x0, 0x0) 17:05:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 302.137389][T13026] XFS (loop0): SB sanity check failed [ 302.149109][T13026] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 302.202424][T13026] XFS (loop0): Unmount and run xfs_repair [ 302.250519][T13026] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 302.304980][T13026] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:05:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 302.404280][T13026] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 302.440825][T13042] XFS (loop1): device supports 512 byte sectors (not 0) [ 302.445122][T13026] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 302.546066][T13026] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 302.563012][T13026] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 302.614345][T13026] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:05:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 302.716920][T13026] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 302.738165][T13026] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 302.764645][T13026] XFS (loop0): SB validate failed with error -117. 17:05:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) 17:05:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4020001000010070000000000000000", 0x75}], 0x0, 0x0) 17:05:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 303.220287][T13093] device lo entered promiscuous mode 17:05:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 303.558821][T13109] XFS (loop0): SB sanity check failed [ 303.566063][T13105] XFS (loop1): device supports 512 byte sectors (not 0) [ 303.580490][T13109] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 303.680815][T13109] XFS (loop0): Unmount and run xfs_repair [ 303.716117][T13109] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 303.726787][T13109] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 303.745922][T13109] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 303.787121][T13109] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 17:05:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 303.830465][T13109] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 303.846958][T13109] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) [ 303.992490][T13109] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 304.013210][T13109] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 304.076760][T13109] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 304.085791][T13109] XFS (loop0): SB validate failed with error -117. 17:05:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 304.263990][T13159] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c", 0x79}], 0x0, 0x0) 17:05:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) [ 306.085799][T13280] device lo left promiscuous mode 17:05:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 306.135487][T13259] XFS (loop0): SB sanity check failed [ 306.157579][T13259] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 306.197126][T13259] XFS (loop0): Unmount and run xfs_repair [ 306.215066][T13259] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 306.242270][T13292] device lo entered promiscuous mode [ 306.262842][T13266] XFS (loop1): device supports 512 byte sectors (not 0) [ 306.286777][T13259] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:05:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf\xff\xff', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 306.315415][T13259] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 306.360039][T13259] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 306.387325][T13259] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 306.411467][T13259] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 306.421209][T13259] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 306.463251][T13259] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 306.486692][T13259] 00000070: 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 00 00 ................ [ 306.510094][T13259] XFS (loop0): SB validate failed with error -117. 17:05:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x1c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf\x01\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 17:05:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c", 0x79}], 0x0, 0x0) 17:05:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x1c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf\x01\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 309.214325][T13442] XFS (loop0): SB sanity check failed [ 309.214385][T13468] device lo left promiscuous mode [ 309.225143][T13442] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 309.225995][T13448] XFS (loop1): device supports 512 byte sectors (not 0) [ 309.253485][T13442] XFS (loop0): Unmount and run xfs_repair [ 309.261705][T13442] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 309.275693][T13442] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 309.284935][T13442] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 309.302872][T13442] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 309.315079][T13442] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 309.332346][T13442] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 309.342039][T13442] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:05:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 309.362982][T13475] device lo entered promiscuous mode 17:05:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 309.412816][T13442] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:05:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 309.477735][T13442] 00000070: 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 00 00 ................ [ 309.493650][T13442] XFS (loop0): SB validate failed with error -117. 17:05:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 17:05:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 310.145104][T13503] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs&', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c", 0x79}], 0x0, 0x0) 17:05:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 17:05:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 312.309629][T13572] device lo left promiscuous mode [ 312.328275][T13551] XFS (loop1): device supports 512 byte sectors (not 0) [ 312.340814][T13545] XFS (loop0): SB sanity check failed [ 312.346383][T13545] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 312.406470][T13545] XFS (loop0): Unmount and run xfs_repair [ 312.434284][T13545] XFS (loop0): First 128 bytes of corrupted metadata buffer: 17:05:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 312.496070][T13545] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 312.505572][T13577] device lo entered promiscuous mode [ 312.526972][T13545] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 312.542009][T13545] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 312.575075][T13545] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 312.641536][T13545] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 312.673717][T13545] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 312.725174][T13545] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 312.757066][T13545] 00000070: 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 00 00 ................ 17:05:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402", 0x67}], 0x0, 0x0) [ 312.806232][T13545] XFS (loop0): SB validate failed with error -117. 17:05:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe3', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs<', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 313.373127][T13625] device lo left promiscuous mode [ 313.390425][ T2995] XFS (loop1): SB sanity check failed [ 313.412025][ T2995] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 313.471750][ T2995] XFS (loop1): Unmount and run xfs_repair 17:05:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 313.518582][ T2995] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 313.557566][ T2995] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 313.588660][ T2995] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 313.597930][ T2995] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 313.606853][ T2995] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 313.615687][ T2995] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 313.626560][ T2995] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:05:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 313.635458][ T2995] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 313.645748][ T2995] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 313.656023][T13602] XFS (loop1): SB validate failed with error -117. [ 313.671260][T13636] device lo entered promiscuous mode [ 313.803327][ T17] XFS (loop0): SB sanity check failed [ 313.810591][ T17] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsA', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 313.891756][ T17] XFS (loop0): Unmount and run xfs_repair [ 313.919356][ T17] XFS (loop0): First 128 bytes of corrupted metadata buffer: 17:05:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 313.934150][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 313.944887][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 313.976237][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 313.994287][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 314.053145][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402", 0x67}], 0x0, 0x0) 17:05:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 314.120039][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 314.171759][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 17:05:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 314.249543][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 00 00 00 00 00 ................ [ 314.262078][T13633] XFS (loop0): SB validate failed with error -117. 17:05:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 314.472359][T13689] device lo left promiscuous mode [ 314.518072][T13676] XFS (loop1): SB sanity check failed [ 314.523723][T13676] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 314.563114][T13676] XFS (loop1): Unmount and run xfs_repair [ 314.572558][T13676] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 314.582830][T13676] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 17:05:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 314.616372][T13676] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 314.655130][T13676] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 314.690054][T13676] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 314.699517][T13676] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 314.720912][T13676] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 17:05:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xda', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 314.761070][T13676] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 314.817879][T13676] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:05:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 314.883544][T13676] XFS (loop1): SB validate failed with error -117. 17:05:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 315.018383][T13708] XFS (loop0): SB sanity check failed [ 315.026331][T13708] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 315.049813][T13708] XFS (loop0): Unmount and run xfs_repair [ 315.055735][T13708] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 315.065070][T13708] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 315.074402][T13708] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 315.086252][T13708] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 315.108289][T13708] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 17:05:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsd', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 315.122792][T13708] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 315.136073][T13708] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 315.145291][T13708] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 315.154867][T13708] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 00 00 00 00 00 ................ [ 315.204534][T13708] XFS (loop0): SB validate failed with error -117. 17:05:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 17:05:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsE', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 315.373553][T13741] device lo entered promiscuous mode 17:05:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:05:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 315.961727][T13777] device lo left promiscuous mode 17:05:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 316.046235][T13762] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsT', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 316.116223][T13777] device lo entered promiscuous mode [ 316.171586][ T12] XFS (loop0): SB sanity check failed [ 316.192023][ T12] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 316.213814][ T12] XFS (loop0): Unmount and run xfs_repair [ 316.221634][ T12] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 316.235346][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 316.247621][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 316.282089][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 316.291658][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 316.301201][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 316.338464][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 316.357816][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 316.367664][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 17:05:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 316.388407][T13780] XFS (loop0): SB validate failed with error -117. 17:05:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) [ 316.679689][T13815] device lo left promiscuous mode [ 316.794325][T13818] device lo entered promiscuous mode 17:05:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:54 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:05:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsl', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 317.122279][T13824] XFS (loop1): device supports 512 byte sectors (not 0) 17:05:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 317.331307][T13853] device lo left promiscuous mode 17:05:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 317.385680][T13832] XFS (loop0): SB sanity check failed [ 317.415637][T13832] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 17:05:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 17:05:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 317.508452][T13832] XFS (loop0): Unmount and run xfs_repair [ 317.529652][T13832] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 317.544117][T13832] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 317.553480][T13832] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 317.563075][T13832] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 317.572094][T13832] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 317.580976][T13832] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 317.580990][T13832] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 317.581000][T13832] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 317.581011][T13832] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 317.581055][T13832] XFS (loop0): SB validate failed with error -117. [ 317.768924][T13872] device lo entered promiscuous mode 17:05:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xfe', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 17:05:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x1c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 317.948627][T13876] XFS (loop1): device supports 512 byte sectors (not 0) [ 318.061289][T13879] XFS (loop2): Mounting V4 Filesystem [ 318.139701][T13879] XFS (loop2): empty log check failed [ 318.151634][T13879] XFS (loop2): log mount/recovery failed: error -5 [ 318.286694][T13879] XFS (loop2): log mount failed 17:05:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs,', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c", 0x79}], 0x0, 0x0) [ 318.431949][T13910] XFS (loop0): SB sanity check failed [ 318.455397][T13910] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 318.550475][T13910] XFS (loop0): Unmount and run xfs_repair [ 318.573693][T13910] XFS (loop0): First 128 bytes of corrupted metadata buffer: 17:05:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 318.614403][T13910] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 318.654645][T13910] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 17:05:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs<', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 318.708923][T13910] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 318.762725][T13910] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 318.829385][ T17] XFS (loop1): SB sanity check failed [ 318.834983][ T17] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 318.866810][T13910] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 318.896912][T13910] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 318.902630][T13950] device lo left promiscuous mode [ 318.932759][ T17] XFS (loop1): Unmount and run xfs_repair 17:05:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 318.967045][T13910] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 318.981078][ T17] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 319.010782][ T17] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 319.038463][T13910] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 319.061048][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 319.137537][T13910] XFS (loop0): SB validate failed with error -117. [ 319.149693][ T17] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 319.206673][ T17] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 319.238598][ T17] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 17:05:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 319.262335][ T17] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 319.278220][ T17] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 319.287443][ T17] 00000070: 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 00 00 ................ [ 319.296355][T13931] XFS (loop1): SB validate failed with error -117. 17:05:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs&', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) [ 319.643270][T13978] device lo entered promiscuous mode 17:05:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc2', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 320.085295][T13985] XFS (loop1): device supports 512 byte sectors (not 0) [ 320.123470][T14012] device lo entered promiscuous mode 17:05:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:05:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xda', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 320.757374][T14021] device lo left promiscuous mode [ 320.774647][T14035] device lo entered promiscuous mode 17:05:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsd', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:05:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsE', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 321.215110][T14061] XFS (loop2): Mounting V4 Filesystem [ 321.265918][T14061] XFS (loop2): empty log check failed [ 321.296797][T14061] XFS (loop2): log mount/recovery failed: error -5 [ 321.367045][T14061] XFS (loop2): log mount failed [ 321.560319][T14050] device lo entered promiscuous mode 17:06:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsT', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 322.943256][T14150] device lo left promiscuous mode [ 323.025690][T14160] device lo left promiscuous mode [ 323.210624][T14166] device lo entered promiscuous mode 17:06:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 323.469817][T14173] XFS (loop2): Mounting V4 Filesystem [ 323.515424][T14173] XFS (loop2): empty log check failed [ 323.526848][T14173] XFS (loop2): log mount/recovery failed: error -5 [ 323.642152][T14173] XFS (loop2): log mount failed [ 323.677831][T14184] device lo left promiscuous mode 17:06:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xb4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 324.006767][T14203] device lo entered promiscuous mode 17:06:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 324.185636][T14215] XFS (loop4): Mounting V4 Filesystem [ 324.237684][T14215] XFS (loop4): empty log check failed [ 324.251256][T14215] XFS (loop4): log mount/recovery failed: error -5 17:06:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xb5', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 324.340513][T14239] XFS (loop2): Mounting V4 Filesystem [ 324.349448][T14215] XFS (loop4): log mount failed [ 324.382412][T14239] XFS (loop2): empty log check failed [ 324.398136][T14239] XFS (loop2): log mount/recovery failed: error -5 [ 324.476798][T14239] XFS (loop2): log mount failed 17:06:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 324.644850][T14207] device lo entered promiscuous mode 17:06:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 324.765682][T14214] device lo left promiscuous mode [ 324.784793][T14224] device lo entered promiscuous mode [ 325.121798][T14271] device lo left promiscuous mode [ 325.154399][T14280] device lo entered promiscuous mode 17:06:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 326.546336][T14326] device lo left promiscuous mode [ 326.587639][T14318] XFS (loop2): Mounting V4 Filesystem [ 326.611387][T14318] XFS (loop2): empty log check failed [ 326.622345][T14318] XFS (loop2): log mount/recovery failed: error -5 17:06:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x96', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 326.696832][T14318] XFS (loop2): log mount failed 17:06:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfst', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 327.090484][T14354] device lo left promiscuous mode 17:06:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 327.512637][T14366] XFS (loop2): Mounting V4 Filesystem [ 327.613178][T14366] XFS (loop2): empty log check failed [ 327.622063][T14366] XFS (loop2): log mount/recovery failed: error -5 [ 327.656813][T14366] XFS (loop2): log mount failed 17:06:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xda', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 328.090446][T14414] device lo entered promiscuous mode 17:06:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsE', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 328.538599][T14418] XFS (loop0): Mounting V4 Filesystem [ 328.579769][T14418] XFS (loop0): empty log check failed [ 328.612249][T14418] XFS (loop0): log mount/recovery failed: error -5 [ 328.677008][T14433] XFS (loop4): Mounting V4 Filesystem [ 328.718139][T14433] XFS (loop4): empty log check failed [ 328.736908][T14418] XFS (loop0): log mount failed [ 328.747742][T14433] XFS (loop4): log mount/recovery failed: error -5 17:06:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsT', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 328.836960][T14433] XFS (loop4): log mount failed [ 328.848333][T14438] XFS (loop2): Mounting V4 Filesystem [ 328.885134][T14438] XFS (loop2): empty log check failed [ 328.908516][T14438] XFS (loop2): log mount/recovery failed: error -5 [ 329.016861][T14438] XFS (loop2): log mount failed 17:06:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 329.108333][T14451] device lo left promiscuous mode [ 329.121167][T14464] device lo entered promiscuous mode 17:06:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsl', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 329.285520][T14469] device lo entered promiscuous mode 17:06:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 329.584911][T14495] XFS (loop4): Mounting V4 Filesystem [ 329.635838][T14502] XFS (loop2): Mounting V4 Filesystem [ 329.655934][T14502] XFS (loop2): empty log check failed [ 329.664530][T14495] XFS (loop4): empty log check failed [ 329.672988][T14495] XFS (loop4): log mount/recovery failed: error -5 [ 329.680430][T14502] XFS (loop2): log mount/recovery failed: error -5 [ 329.691563][T14490] device lo left promiscuous mode [ 329.714541][T14499] device lo entered promiscuous mode [ 329.746867][T14495] XFS (loop4): log mount failed [ 329.756696][T14502] XFS (loop2): log mount failed 17:06:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 330.362799][T14535] XFS (loop3): Mounting V4 Filesystem [ 330.407917][T14535] XFS (loop3): empty log check failed [ 330.426736][T14535] XFS (loop3): log mount/recovery failed: error -5 [ 330.434067][T14551] device lo left promiscuous mode [ 330.516943][T14535] XFS (loop3): log mount failed [ 330.570896][T14553] XFS (loop4): Mounting V4 Filesystem [ 330.626364][T14553] XFS (loop4): empty log check failed [ 330.654788][T14553] XFS (loop4): log mount/recovery failed: error -5 [ 330.674897][T14557] device lo entered promiscuous mode [ 330.736791][T14553] XFS (loop4): log mount failed 17:06:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 331.634081][T14590] XFS (loop1): Mounting V4 Filesystem [ 331.680511][T14590] XFS (loop1): empty log check failed [ 331.708252][T14590] XFS (loop1): log mount/recovery failed: error -5 [ 331.718117][T14624] device lo left promiscuous mode [ 331.755860][T14604] XFS (loop0): Mounting V4 Filesystem [ 331.762287][T14599] XFS (loop4): Mounting V4 Filesystem 17:06:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 331.834616][T14604] XFS (loop0): empty log check failed [ 331.840823][T14590] XFS (loop1): log mount failed [ 331.844706][T14599] XFS (loop4): empty log check failed [ 331.896984][T14599] XFS (loop4): log mount/recovery failed: error -5 [ 331.905890][T14604] XFS (loop0): log mount/recovery failed: error -5 [ 331.996818][T14599] XFS (loop4): log mount failed [ 332.005068][T14636] XFS (loop2): Mounting V4 Filesystem [ 332.056749][T14604] XFS (loop0): log mount failed [ 332.066520][T14636] XFS (loop2): empty log check failed [ 332.075579][T14636] XFS (loop2): log mount/recovery failed: error -5 17:06:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 332.154066][T14636] XFS (loop2): log mount failed 17:06:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 332.837709][T14671] XFS (loop3): Mounting V4 Filesystem 17:06:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 332.919648][T14671] XFS (loop3): empty log check failed [ 332.936754][T14671] XFS (loop3): log mount/recovery failed: error -5 [ 333.046829][T14671] XFS (loop3): log mount failed [ 333.188157][T14697] XFS (loop2): Mounting V4 Filesystem [ 333.193916][T14696] XFS (loop4): Mounting V4 Filesystem 17:06:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 333.262476][T14697] XFS (loop2): empty log check failed [ 333.280117][T14696] XFS (loop4): empty log check failed [ 333.288595][T14697] XFS (loop2): log mount/recovery failed: error -5 [ 333.326379][T14696] XFS (loop4): log mount/recovery failed: error -5 [ 333.366765][T14697] XFS (loop2): log mount failed [ 333.406979][T14696] XFS (loop4): log mount failed 17:06:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) 17:06:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 17:06:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 333.950811][T14736] XFS (loop3): Mounting V4 Filesystem [ 333.999750][T14736] XFS (loop3): empty log check failed [ 334.005237][T14736] XFS (loop3): log mount/recovery failed: error -5 [ 334.117120][T14736] XFS (loop3): log mount failed 17:06:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) getpid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x810) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000), 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(r1, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r2, 0x0, 0x2a3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x900000000000000) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x3ffffffffffc}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000080)="a85b39b1ecd5c15ef9b78652c078cab25b9ef4e585a49542499b9596feb63f4242e44a95fbf98062a268cb04bb874632f88b7e00f6b0f6929637757ee7cb4db92a1956faa1c55af94851d7d9b95764ca6d57695a0b637583746250c49d6964c1deb649d40bfcafb0ce62265909b0542946ed281a454b506c98104795639eea0fd3382e6ae27f6e5ad06382405b55ba8b8ffb1853b97e43716344916d59c9d7afa38e3be9ec148bb436ae7d4c8db3bdf805ce1edc6a68eb9946adc4cdef7cc9aa86e5a9d33cf15d4a32", &(0x7f0000000240)=""/104}, 0x18) [ 334.242285][T14754] XFS (loop4): Mounting V4 Filesystem [ 334.329744][T14754] XFS (loop4): empty log check failed [ 334.346832][T14754] XFS (loop4): log mount/recovery failed: error -5 [ 334.437550][T14754] XFS (loop4): log mount failed [ 334.854432][T14754] XFS (loop4): Mounting V4 Filesystem [ 334.918295][T14754] ================================================================== [ 334.926604][T14754] BUG: KASAN: use-after-free in xlog_alloc_log+0x1266/0x1380 [ 334.933983][T14754] Read of size 8 at addr ffff8880865f8550 by task syz-executor.4/14754 [ 334.942213][T14754] [ 334.944555][T14754] CPU: 1 PID: 14754 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190628 #25 [ 334.953653][T14754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.963706][T14754] Call Trace: [ 334.967005][T14754] dump_stack+0x172/0x1f0 [ 334.971338][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 334.976369][T14754] print_address_description.cold+0xd4/0x306 [ 334.982352][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 334.987385][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 334.992414][T14754] __kasan_report.cold+0x1b/0x36 [ 334.997357][T14754] ? kvfree+0x10/0x70 [ 335.001341][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 335.006373][T14754] kasan_report+0x12/0x17 [ 335.010714][T14754] __asan_report_load8_noabort+0x14/0x20 [ 335.016348][T14754] xlog_alloc_log+0x1266/0x1380 [ 335.021193][T14754] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 335.027432][T14754] xfs_log_mount+0xdc/0x780 [ 335.031951][T14754] xfs_mountfs+0xdb9/0x1be0 [ 335.036470][T14754] ? xfs_default_resblks+0x60/0x60 [ 335.041592][T14754] ? init_timer_key+0x13b/0x3a0 [ 335.046456][T14754] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 335.051834][T14754] ? xfs_filestream_get_ag+0x60/0x60 [ 335.057131][T14754] xfs_fs_fill_super+0xcca/0x16e0 [ 335.062268][T14754] mount_bdev+0x304/0x3c0 [ 335.066598][T14754] ? xfs_test_remount_options+0x90/0x90 [ 335.072155][T14754] xfs_fs_mount+0x35/0x40 [ 335.076489][T14754] ? xfs_finish_flags+0x490/0x490 [ 335.081516][T14754] legacy_get_tree+0x108/0x220 [ 335.086288][T14754] ? legacy_parse_monolithic+0x11f/0x180 [ 335.091913][T14754] vfs_get_tree+0x8e/0x390 [ 335.096307][T14754] do_mount+0x138c/0x1c00 [ 335.100617][T14754] ? copy_mount_string+0x40/0x40 [ 335.105542][T14754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.111758][T14754] ? copy_mount_options+0x2e8/0x3f0 [ 335.116932][T14754] ksys_mount+0xdb/0x150 [ 335.121156][T14754] __x64_sys_mount+0xbe/0x150 [ 335.125808][T14754] do_syscall_64+0xfd/0x6a0 [ 335.130293][T14754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.136248][T14754] RIP: 0033:0x45bf6a [ 335.140119][T14754] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 335.159700][T14754] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.168084][T14754] RAX: ffffffffffffffda RBX: 00007f1eebcbfb40 RCX: 000000000045bf6a [ 335.176040][T14754] RDX: 00007f1eebcbfae0 RSI: 0000000020000000 RDI: 00007f1eebcbfb00 [ 335.183998][T14754] RBP: 0000000000000001 R08: 00007f1eebcbfb40 R09: 00007f1eebcbfae0 [ 335.191944][T14754] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 335.199938][T14754] R13: 00000000004c858e R14: 00000000004df0e0 R15: 00000000ffffffff [ 335.207898][T14754] [ 335.210203][T14754] Allocated by task 14754: [ 335.214599][T14754] save_stack+0x23/0x90 [ 335.218734][T14754] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 335.224338][T14754] kasan_kmalloc+0x9/0x10 [ 335.228649][T14754] __kmalloc+0x163/0x770 [ 335.232887][T14754] kmem_alloc+0xd2/0x200 [ 335.237118][T14754] xlog_alloc_log+0xbf4/0x1380 [ 335.241859][T14754] xfs_log_mount+0xdc/0x780 [ 335.246338][T14754] xfs_mountfs+0xdb9/0x1be0 [ 335.250830][T14754] xfs_fs_fill_super+0xcca/0x16e0 [ 335.255830][T14754] mount_bdev+0x304/0x3c0 [ 335.260133][T14754] xfs_fs_mount+0x35/0x40 [ 335.264439][T14754] legacy_get_tree+0x108/0x220 [ 335.269192][T14754] vfs_get_tree+0x8e/0x390 [ 335.273581][T14754] do_mount+0x138c/0x1c00 [ 335.277901][T14754] ksys_mount+0xdb/0x150 [ 335.282130][T14754] __x64_sys_mount+0xbe/0x150 [ 335.286784][T14754] do_syscall_64+0xfd/0x6a0 [ 335.291281][T14754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.297143][T14754] [ 335.299445][T14754] Freed by task 14754: [ 335.303487][T14754] save_stack+0x23/0x90 [ 335.307614][T14754] __kasan_slab_free+0x102/0x150 [ 335.312521][T14754] kasan_slab_free+0xe/0x10 [ 335.317082][T14754] kfree+0x10a/0x2c0 [ 335.320966][T14754] kvfree+0x61/0x70 [ 335.324748][T14754] xlog_alloc_log+0xea9/0x1380 [ 335.329499][T14754] xfs_log_mount+0xdc/0x780 [ 335.333972][T14754] xfs_mountfs+0xdb9/0x1be0 [ 335.338452][T14754] xfs_fs_fill_super+0xcca/0x16e0 [ 335.343450][T14754] mount_bdev+0x304/0x3c0 [ 335.347751][T14754] xfs_fs_mount+0x35/0x40 [ 335.352056][T14754] legacy_get_tree+0x108/0x220 [ 335.356791][T14754] vfs_get_tree+0x8e/0x390 [ 335.361184][T14754] do_mount+0x138c/0x1c00 [ 335.365489][T14754] ksys_mount+0xdb/0x150 [ 335.369708][T14754] __x64_sys_mount+0xbe/0x150 [ 335.374368][T14754] do_syscall_64+0xfd/0x6a0 [ 335.378849][T14754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.384711][T14754] [ 335.387017][T14754] The buggy address belongs to the object at ffff8880865f84c0 [ 335.387017][T14754] which belongs to the cache kmalloc-1k of size 1024 [ 335.401041][T14754] The buggy address is located 144 bytes inside of [ 335.401041][T14754] 1024-byte region [ffff8880865f84c0, ffff8880865f88c0) [ 335.416290][T14754] The buggy address belongs to the page: [ 335.421901][T14754] page:ffffea0002197e00 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0xffff8880865f9240 compound_mapcount: 0 [ 335.434123][T14754] flags: 0x1fffc0000010200(slab|head) [ 335.439475][T14754] raw: 01fffc0000010200 ffffea00028d4b08 ffffea00022b0608 ffff8880aa400c40 [ 335.448065][T14754] raw: ffff8880865f9240 ffff8880865f8040 0000000100000001 0000000000000000 [ 335.458963][T14754] page dumped because: kasan: bad access detected [ 335.465348][T14754] [ 335.467655][T14754] Memory state around the buggy address: [ 335.473263][T14754] ffff8880865f8400: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 335.481297][T14754] ffff8880865f8480: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 335.489334][T14754] >ffff8880865f8500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 335.497368][T14754] ^ [ 335.504028][T14754] ffff8880865f8580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 335.512067][T14754] ffff8880865f8600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 335.520100][T14754] ================================================================== [ 335.528219][T14754] Disabling lock debugging due to kernel taint [ 335.537493][T14754] Kernel panic - not syncing: panic_on_warn set ... [ 335.544113][T14754] CPU: 1 PID: 14754 Comm: syz-executor.4 Tainted: G B 5.2.0-rc6-next-20190628 #25 [ 335.554580][T14754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.564610][T14754] Call Trace: [ 335.567892][T14754] dump_stack+0x172/0x1f0 [ 335.572200][T14754] panic+0x2dc/0x755 [ 335.576075][T14754] ? add_taint.cold+0x16/0x16 [ 335.580741][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 335.585749][T14754] ? preempt_schedule+0x4b/0x60 [ 335.590594][T14754] ? ___preempt_schedule+0x16/0x18 [ 335.595690][T14754] ? trace_hardirqs_on+0x5e/0x240 [ 335.600692][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 335.605694][T14754] end_report+0x47/0x4f [ 335.609830][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 335.614846][T14754] __kasan_report.cold+0xe/0x36 [ 335.619702][T14754] ? kvfree+0x10/0x70 [ 335.623657][T14754] ? xlog_alloc_log+0x1266/0x1380 [ 335.628656][T14754] kasan_report+0x12/0x17 [ 335.632976][T14754] __asan_report_load8_noabort+0x14/0x20 [ 335.638588][T14754] xlog_alloc_log+0x1266/0x1380 [ 335.643415][T14754] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 335.649629][T14754] xfs_log_mount+0xdc/0x780 [ 335.654137][T14754] xfs_mountfs+0xdb9/0x1be0 [ 335.658634][T14754] ? xfs_default_resblks+0x60/0x60 [ 335.663740][T14754] ? init_timer_key+0x13b/0x3a0 [ 335.668595][T14754] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 335.673965][T14754] ? xfs_filestream_get_ag+0x60/0x60 [ 335.679244][T14754] xfs_fs_fill_super+0xcca/0x16e0 [ 335.684260][T14754] mount_bdev+0x304/0x3c0 [ 335.688563][T14754] ? xfs_test_remount_options+0x90/0x90 [ 335.694081][T14754] xfs_fs_mount+0x35/0x40 [ 335.698383][T14754] ? xfs_finish_flags+0x490/0x490 [ 335.703394][T14754] legacy_get_tree+0x108/0x220 [ 335.708143][T14754] ? legacy_parse_monolithic+0x11f/0x180 [ 335.713748][T14754] vfs_get_tree+0x8e/0x390 [ 335.718149][T14754] do_mount+0x138c/0x1c00 [ 335.722460][T14754] ? copy_mount_string+0x40/0x40 [ 335.727382][T14754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.733625][T14754] ? copy_mount_options+0x2e8/0x3f0 [ 335.738804][T14754] ksys_mount+0xdb/0x150 [ 335.743022][T14754] __x64_sys_mount+0xbe/0x150 [ 335.747700][T14754] do_syscall_64+0xfd/0x6a0 [ 335.752199][T14754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.758065][T14754] RIP: 0033:0x45bf6a [ 335.761934][T14754] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 335.781537][T14754] RSP: 002b:00007f1eebcbfa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.789949][T14754] RAX: ffffffffffffffda RBX: 00007f1eebcbfb40 RCX: 000000000045bf6a [ 335.797917][T14754] RDX: 00007f1eebcbfae0 RSI: 0000000020000000 RDI: 00007f1eebcbfb00 [ 335.805873][T14754] RBP: 0000000000000001 R08: 00007f1eebcbfb40 R09: 00007f1eebcbfae0 [ 335.813820][T14754] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 335.821792][T14754] R13: 00000000004c858e R14: 00000000004df0e0 R15: 00000000ffffffff [ 335.830990][T14754] Kernel Offset: disabled [ 335.835393][T14754] Rebooting in 86400 seconds..